SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provids mobile users with a secure connection to the company server as if the user has a private line.
back door
virtual provate network
backside bus
network license
2. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
CAD
proprietary software...
ring network
scanner
3. When turning on a computer that has been turned off completly
cold boot
L2 cache
Desktop Computer
sending device
4. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
liquid flow technology
traffic
Latency
power supply
5. The fastest most powerful computer
software suite
supercomputer
compromised computer
thread
6. Random access memory- memory chips that can be read from and written to by the processor and other devices
RAM
phishing
Bay
business software...
7. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
CPU
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
OCR
register
8. Any unwanted signal usually varying quickly
script kiddie
Noise
802.11
streaming
9. Graphic file (JPEG - GIF) slowly replacing GIF
System Unit
PNG
bit
wireless access point
10. Software that helps groups of people work together on projects and share info over a network
utility program
802.11
groupware...
SRAM
11. Cables - telephone lines - radio networks - satellites
payload
Transmission media
streaming
system unit
12. A family member on a computer
CAM
Netiquette
Home user
IM
13. Any data or instructions entered into the memory of the computer
jewel box
Input
IM
access control
14. A legal agreement that permits users to install the software on multiple computers.
port
cyberextortionist
site license
nonvolatile memory
15. The destructive event or prank the program intended to deliver
Transmission media
jack
application software...
payload
16. (laptop computer) portable personal computer often able to fit in your lap
Notebook Computer
Plug and Play
SIMM
chip
17. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
server
protocol
wireless Internet service provider
image processing
18. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
bugs
motherboard
adware
crimeware
19. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
adapter cards
e- learning
hard disk
Content Aggregator
20. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
platter
Application software...
nonvolatile memory
node
21. A system that attempts to imitate the behavior of a human brain.
turnaround document
Bluetooth
Netiquette
neural network
22. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
network topology
trackball
Dial up modems
proxy server
23. Used to gain competitive advantage
data collection device
corporate spies
volatile memory
digital modem
24. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
broadband
embedded computer
Plug and Play
Content Aggregator
25. Saves any open docs or programs to hardisk before removing power
DVI
traffic
streaming cam
hibernate
26. The technology of authenticating a persons identity by verifying a personal characteristic.
PIM
biometrics
web filter
public- domain software...
27. Privately owned and limited to a specific vendor or computer model.
Fiber to the Premises
expansion bus
proprietary software...
VAN
28. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
formatting
application software...
wireless modem
ergonomics
29. The process if a computer or device recieveing info info from the server on the internet
cloud storage
OSP
downloading
Output
30. Copyrighted software that is distributed at no cost for a trial period
shareware...
digital certificate
L2 cache
File compression utility
31. One or more computers on the network request services from the server. 10 or more computers
bandwidth
client/server
kernal
File compression utility
32. Major carriers of network traffic
Internet Backbone
project management software...
Linux
Desktop Computer
33. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
public- domain software...
cyberextortionist
Domain name
RAM
34. Can be peropheral or chip - creates sound from digital instructions.
synthesizer
port
network standard
audit trail
35. Uses devices that emit and sense light to detect the mouses movement
optical mouse
pointing stick
LAN
DTP
36. Processor begins to fetch a second instruction before it completes the full machine cycle
Memory Cache
POST
pipelining
Hot spots
37. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
warm boot
RIMM
streaming
Desktop Computer
38. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
File compression utility
keygen
Output
communications
39. Computing device small enough to hold in your hand
fixed wireless
Mobile Device
backside bus
W3C
40. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
EULA
NAS
Bluetooth
tactile output
41. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
scanner
liquid flow technology
cracker
adware
42. A know specific pattern of virus code.
virus signature
database
superscalar
twisted pair cable
43. On software is infinitie space and depth for VR
payload
GPU
VR
VR world
44. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
pretty good Privacy
Linux
virus
data collection device
45. Is an online area in which isers have wrtten discussions about a particular subject.
newsreader
EULA
newsgroup
DTP
46. CA resposible for giving out digital certificate
Mobile Computer
certificate authority
Memory
telesurgery
47. Controls timing of all computer operations
TCP/IP
Noise
system clock
network standard
48. Electrical supply drops.can cause data loss but generally not cause equipment damage
adapter cards
ergonomics
sound card
undervoltage
49. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
Transmission media
disk fragmenter
cracker
MMS
50. They can execute more than one instruction per clock cycle
IM
superscalar
power supply
wireless Internet service provider