SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
RAID
disk fragmenter
pipelining
MMS
2. A communications device that sends and recieves data and info to and from digital line
online auction
embedded operating system
Processor
digital modem
3. A small flat rectangular pointing device that is sensitive to pressure and motion.
Plug and Play
backside bus
touchpad
pointing stick
4. Method that the internet uses to store domain names and their corressponding IP addresses
program
Domain name system
Netiquette
expansion slot
5. CA resposible for giving out digital certificate
Laser printer
certificate authority
virus
Denial of Service attack
6. Holds one or more disk drives
Storage Media
server
hypermedia
drive bay
7. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
Drive Bay
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
EFT
hot plugging
8. Surgeon performs operation by controlling robot when not in the same area as patient.
telesurgery
E- commerce
unauthorized access
disk fragmenter
9. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
E- commerce
RFID
expansion slot
Dial- up access
10. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
air mouse
scanner
buffer
ciphertext
11. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
firmware...
streaming cam
audit trail
spooling
12. The destructive event or prank the program intended to deliver
payload
Dedicated line
database
CPU
13. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
peripheral
image processing
disk controller
multifunction peripheral
14. Encrypted data
cluster
digital modem
ciphertext
groupware...
15. Major carriers of network traffic
Internet Backbone
client/server
Dial- up access
DLP projector
16. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
ALU
adware
ROM
peer to peer network
17. Short for key generator creats software registration numbers and sometimes activation codes.
power supply
Application software...
keygen
IM
18. Human speech is bc of its continous signal that vary in strength and quality
analog
sound card
network
e- learning
19. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
MAN
OSP
L2 cache
SRAM
20. A type of system software that allows users to perform maintenence type tasks
RFID
GUI
VAN
utility program
21. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
spyware
Personal Computers
digital signature
online auction
22. Used to track and identify the location of high risk or high value items.
proxy server
mpeg
RTLS
VR
23. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
disk controller
MAN
turnaround document
jewel box
24. Digital light processor uses tiny mirrors to reflect light
kernal
traffic
DLP projector
worm
25. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
MAN
product activation
fiber optic cable
synthesizer
26. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
site license
Dedicated line
network topology
phishing
27. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
OSP
bus network
platter
product activation
28. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
access time
RSS 2.0
client
token ring
29. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
EULA
wireless access point
sleep mode
recieving device
30. The technology of authenticating a persons identity by verifying a personal characteristic.
power supply
biometrics
FireWire port
USB port
31. Storage over an internet service
cloud storage
hibernate
Content Aggregator
TCP/IP
32. Two main parts are processor and memory.
Motherboard
integrated circuit
ghosting
sound card
33. Someone who accesses a computer or network illegally. Some say they hack to improve security
TLS
network license
hacker
Point of Sale terminals
34. Internet teephony- enables users to speak to other users over the internet
Personal Computers
certificate authority
Internet Backbone
VoIP
35. Graphic file (JPEG - GIF) slowly replacing GIF
adapter card
device independent
adapter cards
PNG
36. The discovery - collection adn analysis of evidence found on computers and networks
motherboard
peer to peer network
registrar
digital forensics
37. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
software suite
File compression utility
gender changer
streaming cam
38. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
motherboard
PIM
certificate authority
optical reader
39. A personal computer you can carry from place to place
Mobile Computer
capacity
hibernate
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
40. Graphics processing unit controls the manipulation and display of graphics on the display device.
DSL
heat pipe
CAM
GPU
41. Used to gain competitive advantage
drive bay
corporate spies
byte
Trojan Horse
42. Copyrighted software that is distributed at no cost for a trial period
device independent
shareware...
VoIP
system software...
43. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
system clock
CU
botnets
ROM
44. Smallest element in an electronic image
SIMM
product activation
pixel
adapter cards
45. Uses devices that emit and sense light to detect the mouses movement
superscalar
Laser printer
Servers
optical mouse
46. They consist entirely of electronic components and contain no moving parts.
honeypot
solid state media
virtual provate network
Application software...
47. A collection of data organized in a manner that allows access retrieval and use of that data
database
online auction
unethical employees
wordwrap
48. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
system unit
power supply
back door
system clock
49. Small capacity built directly in the processor chip
L1 cache
Content Aggregator
cold boot
macros
50. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
sound card
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
player
business software...