SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A rectangular opeining that typically holds disk drives.
Mobile Computer
phishing
Drive Bay
CPU
2. Computer aided design software assists a professional user in creating designs
star network
trackball
CAD
network topology
3. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
System Unit
ASCII
RSS 2.0
audit trail
4. The standard that outlines characteristics of how two network devices communicate
certificate authority
protocol
Transmission media
animated Gif...
5. A vulnerable computer that is set up to entice an intruder to break into it.
honeypot
MRAM
TCP/IP
System Unit
6. Extends the capabilites of a browser.
public- domain software...
phishing
Servers
plug- in
7. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
USB hub
Laser printer
CU
system on a chip
8. Transmits data via infared light waves.. Both computer and device must have the port for it to work
ghosting
spooling
IrDA Port
DNS Server
9. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
warm boot
hypertext
POST
registrar
10. Uses devices that emit and sense light to detect the mouses movement
network topology
Bay
spyware
optical mouse
11. A family member on a computer
LAN
cluster
Home user
Mobile Device
12. Cables - telephone lines - radio networks - satellites
Point of Sale terminals
digital
Transmission media
compromised computer
13. Internet Service Provider- a regional or national access provider
ISP
ring network
Motherboard
digital certificate
14. Integrates the functions of a processor - memory and a video card on a single chip.
public- domain software...
system on a chip
fixed wireless
formatting
15. A system that attempts to imitate the behavior of a human brain.
integrated circuit
botnets
neural network
bus network
16. Accepts the transmission of data - instructions - or info
recieving device
twisted pair cable
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
Mobile Device
17. Two main parts are processor and memory.
UNIX
RAM
Motherboard
animated Gif...
18. Smallest element in an electronic image
site license
digital certificate
pixel
plug- in
19. A program that restricts access to certain material on the web
web filter
E- commerce
crimeware
Laser printer
20. Smaller than heat sink cools processors in notebook comps
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
ASCII
synthesizer
heat pipe
21. Rambus inline memory module house RDRAM chips
honeypot
RIMM
E- commerce
software suite
22. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
utility programs
BIOS
CPU
synthesizer
23. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
Motherboard
802.11
Content Aggregator
system unit
24. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
hot spot
Domain name
optical reader
cracker
25. Controls timing of all computer operations
newsreader
bit
system clock
http
26. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
telemedicine
Internet Backbone
memory slots
NAS
27. Is a security measure that defines who can access it and what actions they can take while acessing the computer
telemedicine
public- domain software...
Internet Backbone
access control
28. Instead of port - jack is used to identify audio or video ports.
chip
superscalar
streaming
jack
29. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
port
adware
ciphertext
stored program concept
30. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
program
streaming
unethical employees
sleep mode
31. A document that you return to the company that creates and sends it.
Memory
turnaround document
streaming cam
analog
32. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
File compression utility
server
TCP/IP
heat pipe
33. Moving pictures experts group is a popular video compression standard
RAM
SMTP
newsgroup
mpeg
34. Special software to listen to audio
macros
client
Notebook Computer
player
35. The number of bits in an area on a storage medium - Higher density means more storage capacity
cold boot
FireWire port
ALU
density
36. Allows the processor to communicate with peripherals.
hard disk
Terminal
expansion bus
DIMM
37. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
Software...
utility program
mashup
CMOS
38. A type of always on connection that is established between two communications devices. better than dial up line
Linux
shareware...
pointing stick
Dedicated line
39. Protective case for optical discs
jewel box
Noise
disk fragmenter
TLS
40. Obtains data directly at the location where the transaction or event takes place.
WAN
access time
expansion bus
data collection device
41. Holds one or more disk drives
e- learning
sending device
drive bay
client/server
42. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
adware
stored program concept
EDI
script kiddie
43. When businesses use the internet to sell products
virtual provate network
E- retail
bugs
DVI
44. Any data or instructions entered into the memory of the computer
Input
streaming
supercomputer
cluster
45. The technology of authenticating a persons identity by verifying a personal characteristic.
plaintext
biometrics
cross - platform
bugs
46. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
hard disk
Drive Bay
supercomputer
platter
47. Joins a cable and a port
wireless Internet service provider
access control
animated Gif...
connector
48. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
utility program
wireless Internet service provider
business software...
spyware
49. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
project management software...
SIMM
IM
player
50. The amount of data - instructions - and information that can travel over communications channel
product activation
spyware
cross - platform
bandwidth