SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Holds one or more disk drives
EFT
drive bay
audit trail
client
2. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
CMOS
bus
Input
back door
3. Short for key generator creats software registration numbers and sometimes activation codes.
worm
hypertext
keygen
chasis...
4. Health care professions conduct live conferences on the computer
Input
Laser printer
telemedicine
MRAM
5. Human speech is bc of its continous signal that vary in strength and quality
solid state drive
node
analog
chat client
6. Uses devices that emit and sense light to detect the mouses movement
optical mouse
traffic
DIMM
density
7. The use of computer or network with out permission
multi- core processor
utility program
unauthorized access
animated Gif...
8. Allows a user to plan schedule and track costs of a project
Hot spots
http
project management software...
cyberextortionist
9. Program that euns only on a specific type or make of computer
device dependant
Desktop Computer
scanner
PNG
10. Random access memory- memory chips that can be read from and written to by the processor and other devices
RAM
analog
Personal Computers
air mouse
11. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
File compression utility
Denial of Service attack
chat client
hypertext
12. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
token ring
VAN
Netbook
hot spot
13. A small flat rectangular pointing device that is sensitive to pressure and motion.
CAM
peer to peer network
touchpad
system on a chip
14. Consists of electronic components that store instructions waiting to be executed (On motherboard)
proprietary software...
overvoltage
SRAM
Memory
15. Screen savors were made to prevent this - which etched images permanently onto the screen
MMS
parallel processing
newsreader
ghosting
16. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
server
Storage Media
CMOS
backside bus
17. Fetching - decoding - executing - storing
machine cycle
Linux
mashup
system software...
18. Retains existing application software and data files even if you can change computer models or vendors
analog
scanner
CAPTCHA
device independent
19. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
message board
buffer
W3C
spoofing
20. PGP an encryption program
fault tolerant computer
proprietary software...
video card
pretty good Privacy
21. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
registrar
ergonomics
spider
multifunction peripheral
22. Searches for and removes unneccessary files
cyberextortionist
disk cleanup
Denial of Service attack
utility program
23. Contains many microscopic pathways capable of carrying an electrical current
System Unit
mpeg
integrated circuit
sending device
24. They can execute more than one instruction per clock cycle
superscalar
payload
motherboard
capacity
25. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
client/server
bit
disk controller
SMTP
26. Data that has been processed in a useful form- text - graphics - audio - video
Output
digital forensics
digital certificate
Netbook
27. Provids mobile users with a secure connection to the company server as if the user has a private line.
application software...
Memory
virtual provate network
network
28. A unique number that identifies the location of a byte in memory
streaming cam
address
cluster
bit
29. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
jack
IM
hacker
Dial up modems
30. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
Content Aggregator
EDI
VR world
MICR
31. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
defragmenting
twisted pair cable
product activation
bugs
32. Uses radio waves to transmit data between two devices.
ROM
SIMM
heat pipe
Bluetooth
33. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
multifunction peripheral
ROM
ethernet
DIMM
34. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
software suite
E- retail
fixed wireless
RSS 2.0
35. Someone who accesses a computer or network illegally. Some say they hack to improve security
hacker
virus signature
plaintext
message board
36. Copyrighted software provided at no cost by company that retains all rights to software
network architecture
DLP projector
Point of Sale terminals
freeware...
37. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
hash
disk fragmenter
utility programs
expansion bus
38. Any unwanted signal usually varying quickly
Noise
web filter
star network
device dependant
39. The destructive event or prank the program intended to deliver
groupware...
video card
bugs
payload
40. The last section of the domain name
heat sink
system clock
peer to peer network
Top level domain
41. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
wordwrap
heat sink
System Software...
newsgroup
42. Type of notebook comp that is smaller and less powerful than a normal notebook comp
Netbook
Notebook Computer
memory slots
port
43. Initiates an instruction to transmit data - instructions - or information.
byte
optical disc
BIOS
sending device
44. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
power supply
CERT/CC
network
product activation
45. Obtains data directly at the location where the transaction or event takes place.
freeware...
802.11
data collection device
microbrowser
46. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
communications
Web Browser
coaxial cable
sound card
47. Dynamic ram- chips must be re energized constantly or they lose their contents.
DRAM
wireless Internet service provider
System Software...
embedded operating system
48. The number of bytes a storage medium can hold
machine cycle
TCP/IP
analog
capacity
49. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
Web conference
product activation
proxy server
Denial of Service attack
50. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
fault tolerant computer
hot spot
Bay
dialog box