SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A legal agreement that allows multiple users to access the software on the server simutaneously
unethical employees
Transmission media
WAN
network license
2. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
Processor
Dedicated line
transistor
connector
3. A rectangular opeining that typically holds disk drives.
Content Aggregator
DIMM
Drive Bay
Bluetooth
4. Two main parts are processor and memory.
EULA
supercomputer
formatting
Motherboard
5. Online service provider- has many members features along with internet access such as IM or Web browsers.
CMOS
OSP
Personal Computers
newsreader
6. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
newsgroup
port
solid state drive
cloud storage
7. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
liquid flow technology
Dial- up access
Web Browser
dot matrix printer
8. Started the internet as a networking project
biometrics
Communications device
ARPA
volatile memory
9. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
Storage Media
System Unit
peripheral
Mainframe
10. A system that attempts to imitate the behavior of a human brain.
RFID
hot plugging
transistor
neural network
11. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
UNIX
hard disk
Netbook
DVI
12. Contain permanently writeen data - instructions - and information
Latency
firmware...
Storage Media
optical reader
13. A server that you connect to to start a chat session.
chat client
certificate authority
access control
noise
14. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
Dial Up line
spyware
proxy server
virus
15. A web application that combines services from two or more sources creating a new application.
driver
client/server
overvoltage
mashup
16. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
Latency
Operating system
volatile memory
Bluetooth
17. Joins a cable and a port
disk cleanup
adapter card
connector
Memory
18. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
commands
LAN
spoofing
hacker
19. The fastest most powerful computer
network license
supercomputer
spider
pipelining
20. They consist entirely of electronic components and contain no moving parts.
CAD
CAM
image processing
solid state media
21. Allows a user to plan schedule and track costs of a project
project management software...
ergonomics
gender changer
power supply
22. Basic input/output systemis firmware that contains the computers startup instructions
client
streaming cam
Latency
BIOS
23. Media transmit multiple signals simutaneously. Download faster than upload
ergonomics
transistor
broadband
cold boot
24. An instruction that causes a program to perform a specific action.
density
registrar
network architecture
commands
25. The design of computers - devices - and media in the network
rootkit
hypertext
network architecture
preemptive multitasking
26. May break in to computer to exploit security weakness. financial gains - revenge.
cross - platform
heat pipe
unethical employees
byte
27. Optical mark recognition reads hand drawn marks such as circles or rectangles.
Internet Backbone
network card
OMR
utility programs
28. Continues to operate when one of its components fails - ensuring that no data is lost
ROM
Web Browser
bus
fault tolerant computer
29. They can execute more than one instruction per clock cycle
trackball
DSL
superscalar
Mainframe
30. Case of the system unit to protect internal damage
chasis...
bugs
heat pipe
DLP projector
31. Transmission media on which the data - instructions - information travel.
e- learning
disk controller
digital
communications channel
32. Has the illusion of moving images becuase it sends a continuos stream of images
streaming cam
virtual provate network
Personal Computers
superscalar
33. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
Web conference
macros
player
multifunction peripheral
34. Builds and maintains lists of words found on websites. Useful for search engines
capacity
spider
gender changer
EFT
35. A notcie that guarantees a user or web site is legit. E- commerce use it often
digital certificate
MICR
Operating system
Motherboard
36. Encrypted data
DNS Server
communications channel
EDI
ciphertext
37. Mathematical formula that generates a code from the contents of the message
hash
USB port
software suite
bus network
38. Hides within or looks like a legitimate program such as a screen saver
multi- core processor
CAD
touchpad
Trojan Horse
39. Data that has been processed in a useful form- text - graphics - audio - video
cross - platform
peripheral
spooling
Output
40. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
Operating system
e- learning
Memory Cache
Web Application
41. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
digital signature
mashup
Intrusion detection software...
ALU
42. Allows the processor to communicate with peripherals.
optical disc
expansion bus
jewel box
formatting
43. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
IP address
pipelining
Latency
CPU
44. Dynamic ram- chips must be re energized constantly or they lose their contents.
DRAM
volatile memory
trackball
superscalar
45. Someone who accesses a computer or network illegally. Some say they hack to improve security
cold boot
OMR
script kiddie
hacker
46. World wide web consortium oversees research and sets standards for many areas of the internet
digital
network
W3C
WAN
47. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
ASCII
Communications device
VR
shareware...
48. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
Laser printer
spyware
cross - platform
CMOS
49. Needed generally to participate in a newsgroup
router
Memory
spooling
newsreader
50. Organization that sells and manages domain names
ALU
firmware...
registrar
router