SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A cable forms a closed loop with all computers. one direction
parallel processing
disk cleanup
W3C
ring network
2. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
System Unit
cloud storage
worm
ASCII
3. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
payload
CAD
spooling
scanner
4. A small flat rectangular pointing device that is sensitive to pressure and motion.
hibernate
touchpad
traffic
supercomputer
5. Small capacity built directly in the processor chip
player
L1 cache
utility programs
pointing stick
6. A server that you connect to to start a chat session.
freeware...
terminal
broadband internet service
chat client
7. Digital light processor uses tiny mirrors to reflect light
DLP projector
site license
Plug and Play
Domain name system
8. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
NAS
Mobile Device
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
node
9. A family member on a computer
IM
video card
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
Home user
10. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
recieving device
EDI
system software...
BIOS
11. A real time internet communications service where you can talk to people online.
Dedicated line
IM
optical reader
Output
12. Initiates an instruction to transmit data - instructions - or information.
cable modem
sending device
program
peer to peer network
13. Uses radio waves to transmit data between two devices.
memory module
Latency
Bluetooth
scanner
14. PGP an encryption program
RAID
DRAM
MAN
pretty good Privacy
15. Graphical User interface - interact with software using text - graphics - and icons
downloading
tactile output
RFID
GUI
16. Obtains data directly at the location where the transaction or event takes place.
data collection device
Latency
USB port
Storage Device
17. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
Memory
wireless access point
capacity
ciphertext
18. Short for key generator creats software registration numbers and sometimes activation codes.
hacker
DIMM
keygen
OMR
19. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
CAD
client
script kiddie
DTP
20. Moving pictures experts group is a popular video compression standard
MRAM
kernal
http
mpeg
21. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
Personal Computers
System Software...
Dial up modems
cold boot
22. Contain permanently writeen data - instructions - and information
firmware...
USB port
Mobile Device
MICR
23. The smallest unit of disk space that stores data and info
public- domain software...
analog
RFID
cluster
24. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
Laser printer
Application software...
ROM
Software...
25. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
Fiber to the Premises
CMOS
video card
virtual provate network
26. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
IM
System Unit
disk fragmenter
web filter
27. Provids mobile users with a secure connection to the company server as if the user has a private line.
virtual provate network
E- commerce
honeypot
application software...
28. Unencrypted readable data
optical mouse
optical disc
plaintext
PIM
29. Text version of an IP address
ghosting
web filter
Domain name
capacity
30. Media transmit multiple signals simutaneously. Download faster than upload
wireless Internet service provider
star network
broadband
proprietary software...
31. A rectangular opeining that typically holds disk drives.
Drive Bay
device independent
TLS
overvoltage
32. Random access memory- memory chips that can be read from and written to by the processor and other devices
RAM
payload
buffer
Home user
33. On the motherboard hold memory modules
system unit
memory slots
W3C
IM
34. Personal information manager is application software that includes features to help users organize personal info
System Unit
PIM
Linux
Information system
35. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
system clock
client/server
density
Denial of Service attack
36. Builds and maintains lists of words found on websites. Useful for search engines
spider
MAN
proprietary software...
address
37. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
utility program
traffic
Storage Device
Trojan Horse
38. Software that helps groups of people work together on projects and share info over a network
worm
unethical employees
groupware...
undervoltage
39. A colection of individual programs available together as a unit. lower cost and ease of use
RIMM
software suite
hash
virus
40. The destructive event or prank the program intended to deliver
bandwidth
telesurgery
mashup
payload
41. Copyrighted software provided at no cost by company that retains all rights to software
freeware...
L2 cache
download
utility programs
42. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
ARPA
network card
Web Application
application software...
43. Hardware - software - data - people - procedures
trackball
telesurgery
warm boot
Information system
44. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
EFT
CERT/CC
RFID
network
45. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
device dependant
network standard
hot spot
jack
46. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
DTP
mashup
DRAM
image processing
47. Hypertext transfer protocol
http
e- learning
machine cycle
virus
48. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
hibernate
802.11
Application software...
disk fragmenter
49. A document that you return to the company that creates and sends it.
spider
twisted pair cable
turnaround document
honeypot
50. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
cloud storage
node
buffer
biometrics