SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. zombie
hacker
byte
cross - platform
compromised computer
2. The number of bits in an area on a storage medium - Higher density means more storage capacity
CAM
stored program concept
density
sending device
3. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
Mainframe
CMOS
adware
Dedicated line
4. Graphic file (JPEG - GIF) slowly replacing GIF
Plug and Play
Notebook Computer
PNG
terminal
5. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
disk fragmenter
http
phishing
shareware...
6. Case of the system unit to protect internal damage
connector
chasis...
botnets
firmware...
7. The amount of data - instructions - and information that can travel over communications channel
proxy server
LAN
bandwidth
e- learning
8. One or more computers on the network request services from the server. 10 or more computers
client/server
newsreader
ergonomics
rootkit
9. Builds and maintains lists of words found on websites. Useful for search engines
motherboard
spider
hash
cyberterrorist
10. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
project management software...
USB hub
hot plugging
utility program
11. The role of memory to store both data and programs
OMR
volatile memory
stored program concept
IP address
12. Someone who uses internet to destroy or damage computers for political reasons.
optical reader
Terminal
nonvolatile memory
cyberterrorist
13. They can execute more than one instruction per clock cycle
crimeware
node
IP address
superscalar
14. Single inline memory module forms a single set of contacts
SIMM
power supply
Netbook
802.11
15. A server that you connect to to start a chat session.
chat client
analog
plug- in
Terminal
16. Reorganizing it so that the files are store in continous sectors
animated Gif...
system software...
ghosting
defragmenting
17. Universal serial bus port connects peripherals to the computer
pixel
system on a chip
phishing
USB port
18. A type of storage media that consists of flat disc and is written and read by a laser
optical disc
CAM
adapter card
BIOS
19. A colection of individual programs available together as a unit. lower cost and ease of use
platter
volatile memory
software suite
WAN
20. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
wireless modem
DNS Server
peripheral
fiber optic cable
21. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
node
network topology
E- commerce
ring network
22. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
Web Browser
W3C
memory slots
nonvolatile memory
23. A program that hides in a computer and allows someone from a remote location to take control of the computer
kernal
rootkit
cloud storage
client/server
24. Saves any open docs or programs to hardisk before removing power
embedded operating system
hibernate
utility program
downloading
25. Any unwanted signal usually varying quickly
connector
kernal
multifunction peripheral
Noise
26. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
RSS 2.0
embedded operating system
Operating system
network architecture
27. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
Communications device
Application software...
streaming
Denial of Service attack
28. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
CU
CAM
Netiquette
Intrusion detection software...
29. A small flat rectangular pointing device that is sensitive to pressure and motion.
RTLS
touchpad
sleep mode
download
30. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
address
streaming
Personal Computers
ALU
31. Small program that tells the operating system how to communicate with a specific device
driver
e- learning
fixed wireless
jack
32. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
LAN
RAID
ARPA
site license
33. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
overvoltage
preemptive multitasking
bandwidth
air mouse
34. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
ergonomics
digital signature
fiber optic cable
network
35. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
network architecture
video card
POP3
business software...
36. Used to gain competitive advantage
synthesizer
volatile memory
corporate spies
DSL modem
37. Mathematical formula that generates a code from the contents of the message
hash
ring network
DLP projector
node
38. Serves as the interface between the user - the app software - and the computers hardware
system software...
Domain name system
BIOS
Linux
39. On software is infinitie space and depth for VR
VR world
Notebook Computer
NAS
adapter card
40. Designed for mobile devices
DSL
CPU
File compression utility
microbrowser
41. A type of always on connection that is established between two communications devices. better than dial up line
Dedicated line
system bus
botnets
wireless modem
42. Method that the internet uses to store domain names and their corressponding IP addresses
liquid flow technology
Domain name system
CAPTCHA
ring network
43. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
digital modem
Web conference
Bluetooth
utility programs
44. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
back door
fault tolerant computer
scanner
L2 cache
45. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
register
terminal
product activation
hibernate
46. A system that attempts to imitate the behavior of a human brain.
neural network
EFT
ring network
Memory Cache
47. Contain permanently writeen data - instructions - and information
pointing stick
firmware...
DLP projector
dialog box
48. ...
bus
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
DRAM
OSP
49. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
parallel processing
register
ghosting
hacker
50. Holds one or more disk drives
Memory
SRAM
gender changer
drive bay