SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
SMTP
traffic
L1 cache
USB port
2. The role of memory to store both data and programs
WAN
peripheral
ghosting
stored program concept
3. Records in a file both successful and unsuccessful attempts.
Drive Bay
commands
Web Application
audit trail
4. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
scanner
Top level domain
Information system
Laser printer
5. The standard that outlines characteristics of how two network devices communicate
DTP
CPU
access time
protocol
6. When businesses use the internet to sell products
802.11
E- retail
Mainframe
digital
7. Type of notebook comp that is smaller and less powerful than a normal notebook comp
proxy server
Web conference
botnets
Netbook
8. A family member on a computer
Home user
FireWire port
motherboard
chat client
9. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
network license
DLP projector
register
Transmission media
10. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
Mobile Device
shareware...
PIM
access time
11. Special software to listen to audio
site license
tactile output
player
streaming cam
12. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
kernal
Storage Device
peer to peer network
Latency
13. Searches for and removes unneccessary files
Terminal
802.11
disk cleanup
system clock
14. Allows the processor to communicate with peripherals.
expansion bus
optical reader
system bus
Terminal
15. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
bugs
e- learning
liquid flow technology
online security service
16. The number of bits in an area on a storage medium - Higher density means more storage capacity
CMOS
protocol
density
Denial of Service attack
17. Completely Automated Public Turing test to tell Computers and Humans Apart.
proxy server
wordwrap
CAPTCHA
Fiber to the Premises
18. Encrypted data
twisted pair cable
chasis...
ciphertext
memory module
19. A know specific pattern of virus code.
downloading
animated Gif...
virus signature
multi- core processor
20. Saves any open docs or programs to hardisk before removing power
wordwrap
digital forensics
hibernate
disk controller
21. A document that you return to the company that creates and sends it.
turnaround document
DIMM
message board
touchpad
22. Has the illusion of moving images becuase it sends a continuos stream of images
streaming cam
keygen
broadband
Domain name system
23. Media transmit multiple signals simutaneously. Download faster than upload
trackball
drive bay
IM
broadband
24. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
DTP
utility program
turnaround document
system clock
25. Method that the internet uses to store domain names and their corressponding IP addresses
gender changer
streaming cam
hypertext
Domain name system
26. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
kernal
system software...
hypertext
fault tolerant computer
27. Broadband modem- sends and recives digital data over the cable television
Fiber to the Premises
cable modem
Trojan Horse
database
28. Anopening inside the system unit in which you can install additional equipment. Different than a slot
expansion slot
Bay
MICR
byte
29. A notcie that guarantees a user or web site is legit. E- commerce use it often
wordwrap
memory slots
Top level domain
digital certificate
30. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
peripheral
application software...
telemedicine
ALU
31. Continues to operate when one of its components fails - ensuring that no data is lost
fault tolerant computer
sleep mode
Bay
ciphertext
32. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
Bay
download
parallel processing
overvoltage
33. Needed generally to participate in a newsgroup
noise
newsreader
audit trail
air mouse
34. Someone who uses internet to destroy or damage computers for political reasons.
cyberterrorist
Storage Device
disk controller
client/server
35. Designed for mobile devices
nonvolatile memory
player
microbrowser
RAM
36. Small capacity built directly in the processor chip
product activation
EULA
RSS 2.0
L1 cache
37. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
ethernet
LAN
port
phishing
38. Uses radio waves to transmit data between two devices.
wireless Internet service provider
Bluetooth
Processor
network
39. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
system bus
heat sink
network topology
back door
40. Unencrypted readable data
database
corporate spies
unauthorized access
plaintext
41. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
online security service
Fiber to the Premises
digital certificate
server
42. The smallest unit of disk space that stores data and info
Servers
BIOS
cluster
MICR
43. Processor begins to fetch a second instruction before it completes the full machine cycle
E- commerce
http
pipelining
digital forensics
44. Device with a monitor - keyboard - and memory
Terminal
OMR
communications
Intrusion detection software...
45. Can connect multiple types of devices that require faster data transmission speeds.
FireWire port
E- commerce
Notebook Computer
adware
46. Two or more computers transfer data - instructions - and information.
LAN
virus signature
player
communications
47. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
RSS 2.0
heat sink
TLS
cluster
48. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
peripheral
back door
Hot spots
File compression utility
49. Protective case for optical discs
animated Gif...
jewel box
optical mouse
IM
50. A part of the motherboard and connects the processor to main memory
turnaround document
Content Aggregator
system bus
DVI