SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
download
cross - platform
back door
network
2. Allows the processor to communicate with peripherals.
Information system
expansion bus
keygen
newsreader
3. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
Firewall
PNG
OMR
business software...
4. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
density
cross - platform
device dependant
scanner
5. Unencrypted readable data
RFID
plaintext
optical mouse
Intrusion detection software...
6. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
program
token ring
digital certificate
script kiddie
7. The number of bytes a storage medium can hold
RTLS
animated Gif...
capacity
Transmission media
8. Hypertext transfer protocol
http
DVI
IrDA Port
sending device
9. Completely Automated Public Turing test to tell Computers and Humans Apart.
mashup
system clock
CAPTCHA
DVI
10. Rambus inline memory module house RDRAM chips
Desktop Computer
database
RIMM
wireless Internet service provider
11. Latest version of Post office Protocol
POP3
thread
optical reader
Memory
12. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
machine cycle
RAID
Application software...
memory module
13. Searches for and removes unneccessary files
Hot spots
business software...
disk cleanup
Memory Cache
14. A program that restricts access to certain material on the web
Web conference
web filter
Netbook
POP3
15. Contain permanently writeen data - instructions - and information
RSS 2.0
firmware...
Domain name system
MRAM
16. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
plug- in
certificate authority
disk controller
peripheral
17. When businesses use the internet to sell products
VR
E- retail
CMOS
Servers
18. They consist entirely of electronic components and contain no moving parts.
optical reader
register
solid state media
Point of Sale terminals
19. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
TCP/IP
DRAM
Denial of Service attack
preemptive multitasking
20. The fastest most powerful computer
Input
supercomputer
download
OCR
21. A type of always on connection that is established between two communications devices. better than dial up line
Dedicated line
recieving device
SMTP
worm
22. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
synthesizer
MRAM
image processing
backside bus
23. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
coaxial cable
rootkit
DIMM
ROM
24. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
stylus
optical disc
chip
System Unit
25. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
liquid flow technology
EDI
telesurgery
wireless access point
26. The use of computer or network with out permission
expansion slot
EULA
Memory
unauthorized access
27. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
access time
RFID
MAN
cold boot
28. Used to track and identify the location of high risk or high value items.
Memory
network license
jack
RTLS
29. Major carriers of network traffic
MAN
stylus
Internet Backbone
freeware...
30. Special software to listen to audio
device dependant
player
system clock
crimeware
31. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
hard disk
broadband internet service
adware
supercomputer
32. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
DSL
address
backside bus
newsgroup
33. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
terminal
network topology
Content Aggregator
trackball
34. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
solid state media
hypermedia
RAID
MAN
35. Cables - telephone lines - radio networks - satellites
back door
system bus
platter
Transmission media
36. The delivery of education via some electronic method such as the internet - networks - or optical disks.
VR world
e- learning
Processor
router
37. Short for key generator creats software registration numbers and sometimes activation codes.
public- domain software...
keygen
overvoltage
SRAM
38. Acts as an electronic switch that opens or closes the circuit for electrical charges
network license
UNIX
transistor
commands
39. Storage over an internet service
cyberextortionist
cloud storage
System Software...
Netiquette
40. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
undervoltage
trackball
capacity
ethernet
41. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
Dial Up line
SMTP
adware
CAPTCHA
42. Is an online area in which isers have wrtten discussions about a particular subject.
newsgroup
drive bay
SIMM
client/server
43. A small metal or plastic device that uses pressure instead of ink.
Intrusion detection software...
disk fragmenter
stylus
ISP
44. The code of acceptable behaviors users should follow while on the internet.
Netiquette
system unit
trackball
DVI
45. Organization that sells and manages domain names
mpeg
rootkit
MMS
registrar
46. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
IP address
RTLS
turnaround document
Operating system
47. Links in text based documents
hypertext
sound card
RFID
public- domain software...
48. Holds one or more disk drives
shareware...
Personal Computers
drive bay
capacity
49. Operating system on mobile devices that generally resides on ROM
L1 cache
traffic
embedded operating system
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
50. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
fault tolerant computer
WAN
database
cold boot