SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
PNG
POST
hypertext
Dial- up access
2. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
hard disk
CMOS
noise
MICR
3. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
adapter cards
bus
dot matrix printer
Personal Computers
4. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
Software...
IM
Domain name
buffer
5. World wide web consortium oversees research and sets standards for many areas of the internet
rootkit
W3C
product activation
spooling
6. Donated for public use has no copyright restrictions
telesurgery
CERT/CC
public- domain software...
Operating system
7. A program that restricts access to certain material on the web
web filter
Input
Plug and Play
biometrics
8. A program that hides in a computer and allows someone from a remote location to take control of the computer
digital signature
multifunction peripheral
WAN
rootkit
9. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
EULA
multifunction peripheral
macros
digital forensics
10. Completely Automated Public Turing test to tell Computers and Humans Apart.
CAPTCHA
USB hub
MMS
wordwrap
11. Cables - telephone lines - radio networks - satellites
DIMM
streaming cam
Transmission media
business software...
12. The design of computers - devices - and media in the network
virus signature
spooling
network architecture
digital forensics
13. Two or more computers transfer data - instructions - and information.
solid state media
mpeg
DIMM
communications
14. A server that you connect to to start a chat session.
DRAM
VR world
freeware...
chat client
15. Mathematical formula that generates a code from the contents of the message
token ring
sending device
proxy server
hash
16. Allows a user to plan schedule and track costs of a project
Intrusion detection software...
project management software...
overvoltage
streaming cam
17. Consists of electronic components that store instructions waiting to be executed (On motherboard)
Memory
Internet Backbone
undervoltage
Storage Media
18. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
virus
access control
L2 cache
E- retail
19. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
Netbook
scanner
cross - platform
hot spot
20. Transmission media on which the data - instructions - information travel.
WAN
Operating system
liquid flow technology
communications channel
21. (laptop computer) portable personal computer often able to fit in your lap
player
web filter
virus
Notebook Computer
22. Extends the capabilites of a browser.
system software...
Domain name
plug- in
GPU
23. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
L2 cache
cross - platform
memory module
FireWire port
24. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
L2 cache
platter
macros
unauthorized access
25. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
Personal Computers
buffer
OCR
Domain name system
26. A number that uniquely identifies each computer or device connected to the internet (0-255)
commands
Dedicated line
nonvolatile memory
IP address
27. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
hypertext
MAN
cable modem
digital signature
28. A small flat rectangular pointing device that is sensitive to pressure and motion.
warm boot
DSL
DSL
touchpad
29. Allows users to keep typing without using enter at the end of each line
wordwrap
virtual provate network
freeware...
power supply
30. A colection of individual programs available together as a unit. lower cost and ease of use
CERT/CC
optical mouse
newsreader
software suite
31. Perpetrator attempts to obtain your personal or financial info.
Motherboard
cyberextortionist
VR
phishing
32. Text version of an IP address
client/server
IrDA Port
Domain name
hot spot
33. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
Motherboard
802.11
video card
solid state drive
34. Small program that tells the operating system how to communicate with a specific device
hypertext
MICR
driver
supercomputer
35. Dual inline memory module forms two sets of contact
audit trail
mashup
data collection device
DIMM
36. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
fixed wireless
token ring
broadband internet service
system on a chip
37. Provide Wi Fi to mobile computers or devices
Hot spots
mashup
Linux
system software...
38. Picure messaging can occur from mobile to mobile and mobile to email
TLS
MMS
document management software...
E- commerce
39. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
system on a chip
Netiquette
peer to peer network
ASCII
40. A type of always on connection that is established between two communications devices. better than dial up line
Dedicated line
server
Operating system
Internet Backbone
41. Major carriers of network traffic
freeware...
client/server
keygen
Internet Backbone
42. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
synthesizer
product activation
VR
optical disc
43. A real time internet communications service where you can talk to people online.
dot matrix printer
noise
IM
keygen
44. Graphical User interface - interact with software using text - graphics - and icons
GUI
RAM
optical mouse
MRAM
45. Optical mark recognition reads hand drawn marks such as circles or rectangles.
node
DRAM
OMR
recieving device
46. An instruction that causes a program to perform a specific action.
Personal Computers
expansion bus
hash
commands
47. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
Hot spots
proxy server
DVI
client
48. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
device dependant
OCR
message board
power supply
49. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
spyware
Point of Sale terminals
download
E- commerce
50. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
node
parallel processing
online security service
Domain name system