SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
system unit
Software...
wireless modem
Domain name system
2. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
ARPA
kernal
device dependant
Memory
3. PGP an encryption program
embedded operating system
capacity
pretty good Privacy
EULA
4. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
RSS 2.0
optical disc
CPU
Denial of Service attack
5. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
web filter
EULA
USB hub
optical mouse
6. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
star network
network standard
hypermedia
utility program
7. A legal agreement that permits users to install the software on multiple computers.
MMS
site license
token ring
analog
8. Hardware - software - data - people - procedures
Plug and Play
spyware
Hot spots
Information system
9. A communications device that sends and recieves data and info to and from digital line
digital modem
program
RTLS
access control
10. Integrates the functions of a processor - memory and a video card on a single chip.
site license
system on a chip
address
VAN
11. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
ASCII
streaming
hypertext
kernal
12. Communications activity. Handled by NSFnet.
cable modem
cracker
DVI
traffic
13. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
IP address
adapter card
BIOS
spyware
14. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
digital signature
PIM
EULA
Latency
15. A type of system software that allows users to perform maintenence type tasks
terminal
utility program
chat client
optical disc
16. Continues to operate when one of its components fails - ensuring that no data is lost
embedded computer
system unit
fault tolerant computer
RSS 2.0
17. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
PIM
message board
Intrusion detection software...
MICR
18. Special software to listen to audio
POST
player
drive bay
address
19. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
wordwrap
server
client
player
20. A unique number that identifies the location of a byte in memory
public- domain software...
PNG
address
port
21. A window that provides info - presents availabe options - or requests a response.
newsreader
IM
dialog box
hard disk
22. Holds one or more disk drives
parallel processing
network
drive bay
Transmission media
23. A real time internet communications service where you can talk to people online.
ergonomics
IM
ethernet
SMTP
24. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
scanner
disk cleanup
bus network
network topology
25. A type of storage media that consists of flat disc and is written and read by a laser
stored program concept
digital modem
Latency
optical disc
26. Broadband modem- sends and recives digital data over the cable television
Trojan Horse
transistor
cable modem
Input
27. Combines several GIF images ina single GIF file.
token ring
memory slots
microbrowser
animated Gif...
28. Obtains data directly at the location where the transaction or event takes place.
Application software...
shareware...
CMOS
data collection device
29. Data that has been processed in a useful form- text - graphics - audio - video
CAPTCHA
traffic
Output
ethernet
30. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
bus
device dependant
SIMM
adware
31. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
density
EFT
hypertext
multi- core processor
32. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
OCR
Web Application
Firewall
Desktop Computer
33. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
chat client
back door
hot spot
network architecture
34. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
overvoltage
Intrusion detection software...
heat sink
platter
35. When turning on a computer that has been turned off completly
Storage Media
Bay
cold boot
online auction
36. A server that you connect to to start a chat session.
Terminal
Mainframe
chat client
e- learning
37. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
cracker
jewel box
hypertext
ARPA
38. Transmission media on which the data - instructions - information travel.
communications channel
Denial of Service attack
WAN
dialog box
39. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
Motherboard
Trojan Horse
Point of Sale terminals
macros
40. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
Trojan Horse
BIOS
buffer
Processor
41. Acts as an electronic switch that opens or closes the circuit for electrical charges
transistor
Information system
spider
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
42. A device that enables you to join a port and a connector that are both male or female
platter
Storage Device
Drive Bay
gender changer
43. Is an online area in which isers have wrtten discussions about a particular subject.
macros
CMOS
newsgroup
optical mouse
44. Read only memory refers to memory chips storing permanent data and instructions (firmware)
downloading
ROM
trackball
peer to peer network
45. A temporary connection that uses one or more analog telphone lines for communications.
preemptive multitasking
pointing stick
cyberextortionist
Dial Up line
46. Hides within or looks like a legitimate program such as a screen saver
Trojan Horse
optical disc
turnaround document
optical mouse
47. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
Dedicated line
cross - platform
SRAM
plaintext
48. A small flat rectangular pointing device that is sensitive to pressure and motion.
DLP projector
OMR
touchpad
bandwidth
49. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
parallel processing
communications
L2 cache
e- learning
50. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
digital certificate
online security service
compromised computer
Laser printer