SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
optical reader
formatting
streaming
ergonomics
2. Continues to operate when one of its components fails - ensuring that no data is lost
fault tolerant computer
telesurgery
client/server
document management software...
3. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
Dial up modems
digital
TCP/IP
Firewall
4. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
terminal
disk controller
W3C
network
5. Popular for LAN. single central cable.
pipelining
RAID
Web Server
bus network
6. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
wireless Internet service provider
Drive Bay
hot plugging
OCR
7. Smallest unit of data the computer can process
hibernate
site license
bit
digital forensics
8. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
hard disk
node
Latency
cyberterrorist
9. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
Dial- up access
Hot spots
crimeware
back door
10. A web application that combines services from two or more sources creating a new application.
BIOS
ARPA
Motherboard
mashup
11. The use of computer or network with out permission
unauthorized access
RSS 2.0
E- commerce
solid state drive
12. Processor begins to fetch a second instruction before it completes the full machine cycle
Terminal
twisted pair cable
system unit
pipelining
13. Uses radio waves to transmit data between two devices.
driver
network
Bluetooth
platter
14. A small metal or plastic device that uses pressure instead of ink.
stylus
E- commerce
fault tolerant computer
broadband internet service
15. Serves as the interface between the user - the app software - and the computers hardware
access time
system software...
DVI
cloud storage
16. Dual inline memory module forms two sets of contact
E- retail
business software...
DIMM
honeypot
17. A family member on a computer
access control
CAD
Storage Media
Home user
18. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
bus network
Laser printer
DSL modem
online auction
19. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
digital forensics
Output
access time
ISP
20. Hides within or looks like a legitimate program such as a screen saver
adapter cards
Trojan Horse
DNS Server
RAM
21. An electrical disturbance that can degrade communications
noise
air mouse
freeware...
Software...
22. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
cyberextortionist
virtual provate network
telemedicine
business software...
23. The role of memory to store both data and programs
disk fragmenter
microbrowser
stored program concept
defragmenting
24. Provides the user with a physcial response from the device
OCR
unauthorized access
OSP
tactile output
25. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
Drive Bay
Denial of Service attack
hypermedia
spider
26. A document that you return to the company that creates and sends it.
CU
turnaround document
VR
adapter card
27. Provide Wi Fi to mobile computers or devices
jack
terminal
L1 cache
Hot spots
28. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
Storage Device
E- commerce
EFT
cracker
29. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
stored program concept
optical reader
turnaround document
corporate spies
30. Pressure sensitive eraser shaped pointing device
Operating system
Dial up modems
Input
pointing stick
31. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
USB hub
Noise
web filter
virus
32. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
DNS Server
backside bus
POST
web filter
33. Is an online area in which isers have wrtten discussions about a particular subject.
VR world
CMOS
pretty good Privacy
newsgroup
34. Single inline memory module forms a single set of contacts
digital signature
SIMM
Mainframe
digital
35. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
L1 cache
hacker
client/server
Intrusion detection software...
36. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
MRAM
preemptive multitasking
Notebook Computer
DRAM
37. Power on self test to check the various system components and the results are compared with data in a CMOS chip
access time
POST
Web Application
superscalar
38. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
Servers
formatting
neural network
dot matrix printer
39. Other computers and mobile devices on the networ that rely on the server for its resources
BIOS
sleep mode
POST
client
40. Optical mark recognition reads hand drawn marks such as circles or rectangles.
Dial Up line
OMR
Processor
proprietary software...
41. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
embedded operating system
Denial of Service attack
Operating system
Laser printer
42. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
FireWire port
trackball
back door
cracker
43. When online meetings take place on the web
Web conference
Fiber to the Premises
communications channel
VR
44. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
TCP/IP
TLS
CAPTCHA
spooling
45. Cables - telephone lines - radio networks - satellites
RAID
dialog box
Transmission media
PNG
46. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
byte
Web Application
router
digital modem
47. Computer automatically can configure adapter cards and other peripherals as you install them
Communications device
Plug and Play
ASCII
digital modem
48. Contains many microscopic pathways capable of carrying an electrical current
stylus
integrated circuit
wireless access point
UNIX
49. Allows a user to plan schedule and track costs of a project
CAPTCHA
phishing
project management software...
CAD
50. Donated for public use has no copyright restrictions
cold boot
System Unit
database
public- domain software...