SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
back door
terminal
image processing
bit
2. Communications activity. Handled by NSFnet.
cracker
traffic
macros
Operating system
3. A personal computer you can carry from place to place
neural network
Web Browser
OMR
Mobile Computer
4. The discovery - collection adn analysis of evidence found on computers and networks
IM
microbrowser
preemptive multitasking
digital forensics
5. A type of storage media that consists of flat disc and is written and read by a laser
optical disc
chip
gender changer
Input
6. Provide Wi Fi to mobile computers or devices
Hot spots
system bus
disk cleanup
machine cycle
7. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
drive bay
Storage Media
DTP
Operating system
8. Needed generally to participate in a newsgroup
disk controller
newsreader
access time
ethernet
9. Controls timing of all computer operations
download
streaming cam
system clock
back door
10. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
VAN
TLS
Internet Backbone
public- domain software...
11. Operating system on mobile devices that generally resides on ROM
phishing
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
embedded operating system
peer to peer network
12. Smaller than heat sink cools processors in notebook comps
heat pipe
hash
System Unit
DLP projector
13. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
adapter card
ALU
Terminal
utility program
14. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
multi- core processor
DLP projector
RFID
plug- in
15. A rectangular opeining that typically holds disk drives.
Plug and Play
Drive Bay
embedded operating system
Home user
16. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
coaxial cable
hot plugging
TLS
proprietary software...
17. Fetching - decoding - executing - storing
L2 cache
virus signature
machine cycle
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
18. Transmission media on which the data - instructions - information travel.
chat client
MMS
supercomputer
communications channel
19. Data that has been processed in a useful form- text - graphics - audio - video
Operating system
DSL
hypermedia
Output
20. Screen savors were made to prevent this - which etched images permanently onto the screen
Servers
solid state media
wireless modem
ghosting
21. Graphic file (JPEG - GIF) slowly replacing GIF
router
commands
kernal
PNG
22. Connects the processor to cache.
Domain name
backside bus
Notebook Computer
L1 cache
23. Determines the number of bits that can be transmitted at one time
multifunction peripheral
bus width
EULA
Application software...
24. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
motherboard
worm
USB port
compromised computer
25. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
bus network
L1 cache
Mainframe
application software...
26. Processor begins to fetch a second instruction before it completes the full machine cycle
CU
pipelining
Dedicated line
hacker
27. Human speech is bc of its continous signal that vary in strength and quality
telesurgery
newsreader
Processor
analog
28. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
DSL modem
Mainframe
EFT
player
29. A socket in the motherboard that can hold an adapter card
PIM
transistor
ciphertext
expansion slot
30. A number that uniquely identifies each computer or device connected to the internet (0-255)
spoofing
IP address
registrar
NAS
31. A legal agreement that permits users to install the software on multiple computers.
Notebook Computer
unauthorized access
corporate spies
site license
32. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
Input
Communications device
node
image processing
33. A window that provides info - presents availabe options - or requests a response.
public- domain software...
Desktop Computer
dialog box
peripheral
34. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
ergonomics
hypertext
streaming
ethernet
35. Random access memory- memory chips that can be read from and written to by the processor and other devices
system on a chip
system bus
RAM
hypertext
36. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
Servers
phishing
SMTP
motherboard
37. A collection of data organized in a manner that allows access retrieval and use of that data
buffer
Memory
database
communications
38. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
network standard
connector
pipelining
virus signature
39. Saves any open docs or programs to hardisk before removing power
Denial of Service attack
kernal
hibernate
overvoltage
40. Can be peropheral or chip - creates sound from digital instructions.
Dedicated line
OCR
SMTP
synthesizer
41. Most computers (on and off)
registrar
digital
Latency
Transmission media
42. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
disk cleanup
formatting
Personal Computers
hard disk
43. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
pretty good Privacy
macros
streaming cam
kernal
44. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
optical reader
broadband internet service
honeypot
POP3
45. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
Terminal
product activation
TCP/IP
unauthorized access
46. A vulnerable computer that is set up to entice an intruder to break into it.
network
honeypot
dialog box
worm
47. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
peripheral
newsgroup
memory module
Memory Cache
48. Each computer or device on the network. often connected by cables
public- domain software...
node
USB hub
density
49. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
tactile output
TCP/IP
access time
hibernate
50. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
VR
plaintext
MAN
ASCII