SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Surgeon performs operation by controlling robot when not in the same area as patient.
payload
Dial Up line
telesurgery
System Software...
2. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
rootkit
peripheral
digital signature
Bluetooth
3. Links in text based documents
cross - platform
adapter card
hypertext
DSL
4. Integrates the functions of a processor - memory and a video card on a single chip.
ROM
system on a chip
OCR
keygen
5. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
heat sink
capacity
Software...
system on a chip
6. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
VR
multifunction peripheral
gender changer
Bluetooth
7. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
Point of Sale terminals
pointing stick
RTLS
VR
8. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
node
Storage Media
E- commerce
site license
9. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
Laser printer
LAN
fiber optic cable
EULA
10. A communications device that enables a computer or device that does not have a built in networking capability to access a network
telemedicine
business software...
heat pipe
network card
11. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
dot matrix printer
cracker
USB port
cross - platform
12. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
token ring
Mobile Device
connector
wireless modem
13. Uses radio waves to transmit data between two devices.
buffer
Bluetooth
spider
Netiquette
14. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
Mainframe
jewel box
unauthorized access
network standard
15. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
bus network
Hot spots
kernal
ALU
16. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
proxy server
disk controller
integrated circuit
synthesizer
17. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
kernal
CMOS
communications channel
CAM
18. An electrical disturbance that can degrade communications
liquid flow technology
macros
document management software...
noise
19. Organization that sells and manages domain names
machine cycle
Internet Backbone
formatting
registrar
20. Screen savors were made to prevent this - which etched images permanently onto the screen
MMS
motherboard
Linux
ghosting
21. Connects the processor to cache.
biometrics
keygen
multi- core processor
backside bus
22. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
device dependant
adware
pixel
DNS Server
23. Dual inline memory module forms two sets of contact
Noise
DIMM
DLP projector
Software...
24. A program that hides in a computer and allows someone from a remote location to take control of the computer
RAM
rootkit
peripheral
Bay
25. Internet Service Provider- a regional or national access provider
Fiber to the Premises
802.11
DRAM
ISP
26. Transmission media on which the data - instructions - information travel.
hot spot
communications channel
turnaround document
MICR
27. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
unauthorized access
noise
driver
SMTP
28. (laptop computer) portable personal computer often able to fit in your lap
virtual provate network
Notebook Computer
proxy server
SRAM
29. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
proxy server
telesurgery
W3C
worm
30. A system that attempts to imitate the behavior of a human brain.
CAM
neural network
dialog box
sleep mode
31. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
EFT
system on a chip
embedded computer
DTP
32. Graphics processing unit controls the manipulation and display of graphics on the display device.
wireless modem
GPU
wireless Internet service provider
NAS
33. Smaller than heat sink cools processors in notebook comps
spider
RAM
heat pipe
sleep mode
34. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
ergonomics
access time
expansion bus
noise
35. The amount of data - instructions - and information that can travel over communications channel
fiber optic cable
capacity
bandwidth
Firewall
36. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
download
jewel box
broadband
network license
37. Computer automatically can configure adapter cards and other peripherals as you install them
access time
Plug and Play
video card
Transmission media
38. Holds one or more disk drives
VR world
wireless Internet service provider
system clock
drive bay
39. PGP an encryption program
warm boot
E- retail
pretty good Privacy
message board
40. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
DSL
System Unit
image processing
EFT
41. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
system unit
warm boot
MRAM
e- learning
42. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
hot plugging
stylus
port
spoofing
43. Personal information manager is application software that includes features to help users organize personal info
PIM
hacker
Mobile Device
OMR
44. Pressure sensitive eraser shaped pointing device
pointing stick
disk controller
IrDA Port
script kiddie
45. Other computers and mobile devices on the networ that rely on the server for its resources
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
Storage Device
integrated circuit
client
46. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
cyberextortionist
bandwidth
DLP projector
heat sink
47. Graphic file (JPEG - GIF) slowly replacing GIF
PNG
telemedicine
e- learning
client
48. Is a security measure that defines who can access it and what actions they can take while acessing the computer
DVI
ISP
digital signature
access control
49. The smallest unit of disk space that stores data and info
peripheral
cluster
Firewall
online security service
50. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
access control
botnets
density
Application software...