SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Acts as an electronic switch that opens or closes the circuit for electrical charges
ergonomics
touchpad
Point of Sale terminals
transistor
2. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
CAM
shareware...
script kiddie
twisted pair cable
3. Program is one that runs the same on multiple operating systems
Servers
cross - platform
data collection device
ghosting
4. 8 bits grouped together. basic storage unit in memory. Each byte has an address
network standard
DIMM
byte
stylus
5. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
VAN
Web Browser
fiber optic cable
wireless Internet service provider
6. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
memory slots
gender changer
TCP/IP
streaming
7. Initiates an instruction to transmit data - instructions - or information.
sending device
video card
online security service
DRAM
8. Electrical supply drops.can cause data loss but generally not cause equipment damage
undervoltage
terminal
L2 cache
hibernate
9. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
plug- in
wireless modem
spyware
supercomputer
10. The delivery of education via some electronic method such as the internet - networks - or optical disks.
overvoltage
volatile memory
e- learning
project management software...
11. Fetching - decoding - executing - storing
ethernet
machine cycle
IM
Notebook Computer
12. Someone who uses internet to destroy or damage computers for political reasons.
pipelining
cyberterrorist
optical mouse
CMOS
13. Power on self test to check the various system components and the results are compared with data in a CMOS chip
POST
back door
expansion slot
pointing stick
14. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
access time
bus
Storage Media
CAM
15. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
digital
digital certificate
trackball
FireWire port
16. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
microbrowser
broadband
download
device dependant
17. Program that euns only on a specific type or make of computer
device dependant
proxy server
digital certificate
traffic
18. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
gender changer
jewel box
OCR
worm
19. Digital light processor uses tiny mirrors to reflect light
DLP projector
ARPA
CPU
utility program
20. A type of system software that allows users to perform maintenence type tasks
Drive Bay
NAS
utility program
spyware
21. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
dot matrix printer
Communications device
spooling
POST
22. Picure messaging can occur from mobile to mobile and mobile to email
kernal
MMS
RIMM
ISP
23. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
RAID
DVI
multi- core processor
macros
24. An instruction that causes a program to perform a specific action.
disk fragmenter
commands
system software...
access time
25. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
telemedicine
warm boot
Intrusion detection software...
microbrowser
26. Any unwanted signal usually varying quickly
microbrowser
online auction
Home user
Noise
27. Copyrighted software provided at no cost by company that retains all rights to software
BIOS
freeware...
touchpad
liquid flow technology
28. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
CU
CMOS
wireless Internet service provider
spooling
29. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
honeypot
video card
Dial- up access
compromised computer
30. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
database
OMR
rootkit
multifunction peripheral
31. The original article and all subsequent related replies
shareware...
machine cycle
worm
thread
32. Type of notebook comp that is smaller and less powerful than a normal notebook comp
Netbook
TCP/IP
ISP
UNIX
33. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
adware
thread
kernal
player
34. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
RSS 2.0
analog
microbrowser
ROM
35. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
File compression utility
supercomputer
fiber optic cable
bugs
36. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
rootkit
virus
utility programs
transistor
37. When online meetings take place on the web
analog
Web conference
Input
certificate authority
38. Provides the user with a physcial response from the device
ARPA
tactile output
Operating system
connector
39. Designed for mobile devices
microbrowser
FireWire port
online security service
expansion slot
40. The last section of the domain name
spider
OMR
recieving device
Top level domain
41. Provids mobile users with a secure connection to the company server as if the user has a private line.
trackball
plug- in
proxy server
virtual provate network
42. Small capacity built directly in the processor chip
L1 cache
virtual provate network
optical disc
Transmission media
43. A legal agreement that allows multiple users to access the software on the server simutaneously
protocol
broadband
Content Aggregator
network license
44. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
device independent
spoofing
VAN
Domain name system
45. Msot retail stores use POS to record purchases - process cards - and update inventory
wireless modem
system unit
sound card
Point of Sale terminals
46. CA resposible for giving out digital certificate
Firewall
compromised computer
certificate authority
microbrowser
47. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
bus
L2 cache
Notebook Computer
digital
48. Donated for public use has no copyright restrictions
public- domain software...
hacker
spoofing
network
49. Data that has been processed in a useful form- text - graphics - audio - video
hot spot
USB hub
Home user
Output
50. Moving pictures experts group is a popular video compression standard
mpeg
hash
VR
unauthorized access