SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Controls timing of all computer operations
RTLS
system clock
LAN
Dial up modems
2. Data that has been processed in a useful form- text - graphics - audio - video
heat sink
Output
cross - platform
ring network
3. Digital light processor uses tiny mirrors to reflect light
hacker
VAN
MMS
DLP projector
4. The number of bits in an area on a storage medium - Higher density means more storage capacity
synthesizer
density
Input
bandwidth
5. An instruction that causes a program to perform a specific action.
commands
Denial of Service attack
ARPA
hypermedia
6. Protective case for optical discs
unethical employees
wireless modem
jewel box
cyberextortionist
7. A collection of computers and devices connected together - via communications devices and transmissions media.
Memory
botnets
DIMM
network
8. Used to gain competitive advantage
multi- core processor
CAM
adware
corporate spies
9. A legal agreement that permits users to install the software on multiple computers.
motherboard
fault tolerant computer
dialog box
site license
10. Joins a cable and a port
trackball
fixed wireless
connector
online auction
11. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
GPU
Firewall
DRAM
disk controller
12. Most computers (on and off)
digital
RAID
crimeware
solid state media
13. A communications device that sends and recieves data and info to and from digital line
digital modem
Top level domain
Domain name system
commands
14. Two or more computers transfer data - instructions - and information.
Information system
POP3
DLP projector
communications
15. Someone who uses internet to destroy or damage computers for political reasons.
digital modem
cyberterrorist
macros
e- learning
16. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
Output
program
macros
trackball
17. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
video card
buffer
IrDA Port
virtual provate network
18. ...
router
hard disk
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
SRAM
19. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
digital forensics
expansion slot
DTP
program
20. Internet teephony- enables users to speak to other users over the internet
VoIP
sleep mode
DIMM
project management software...
21. Power on self test to check the various system components and the results are compared with data in a CMOS chip
EULA
POST
L1 cache
expansion slot
22. Loses its contents when power is turned off (RAM)
commands
volatile memory
digital signature
worm
23. The destructive event or prank the program intended to deliver
hash
expansion slot
proprietary software...
payload
24. Determines the number of bits that can be transmitted at one time
Memory
bus width
machine cycle
neural network
25. Any data or instructions entered into the memory of the computer
ISP
site license
Input
mpeg
26. A window that provides info - presents availabe options - or requests a response.
preemptive multitasking
dialog box
hibernate
chat client
27. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
access time
system software...
RAID
register
28. Builds and maintains lists of words found on websites. Useful for search engines
peer to peer network
spider
Web Browser
optical reader
29. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
Plug and Play
Personal Computers
turnaround document
chip
30. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
platter
turnaround document
hard disk
Memory Cache
31. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
router
ghosting
multi- core processor
trackball
32. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
DVI
power supply
VR world
adapter cards
33. Smallest element in an electronic image
software suite
virtual provate network
pixel
Software...
34. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
site license
DSL
IM
online security service
35. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
drive bay
Web Application
system unit
Memory
36. Perpetrator attempts to obtain your personal or financial info.
RSS 2.0
MMS
data collection device
phishing
37. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
Storage Device
pipelining
traffic
802.11
38. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
firmware...
peer to peer network
bus width
adware
39. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
ALU
twisted pair cable
Bay
crimeware
40. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
spider
Software...
Desktop Computer
chat client
41. Accepts the transmission of data - instructions - or info
Home user
online security service
GUI
recieving device
42. Other computers and mobile devices on the networ that rely on the server for its resources
Internet Backbone
Netiquette
client
virus signature
43. Saves any open documents and programs to RAM and places computer into a low power state
hash
sleep mode
RAM
web filter
44. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
application software...
mpeg
peer to peer network
animated Gif...
45. A server that you connect to to start a chat session.
chat client
L2 cache
Application software...
power supply
46. When turning on a computer that has been turned off completly
Memory
cold boot
botnets
expansion slot
47. Reorganizing it so that the files are store in continous sectors
defragmenting
Internet Backbone
USB port
UNIX
48. Health care professions conduct live conferences on the computer
utility programs
capacity
telemedicine
pipelining
49. When businesses use the internet to sell products
buffer
network architecture
digital forensics
E- retail
50. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
pixel
Point of Sale terminals
freeware...
System Software...