SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Contains 10 or fewer comps - with similar reponsibilities and capabilities
driver
ROM
peer to peer network
formatting
2. Sends digital data and info from a comp to a DSL line
DSL modem
Plug and Play
bus
chasis...
3. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
IM
thread
nonvolatile memory
client
4. Graphical User interface - interact with software using text - graphics - and icons
certificate authority
GUI
CU
Trojan Horse
5. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
network topology
token ring
streaming
animated Gif...
6. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
802.11
formatting
peer to peer network
ALU
7. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
Hot spots
star network
business software...
address
8. Small program that tells the operating system how to communicate with a specific device
adapter cards
business software...
pixel
driver
9. A cable forms a closed loop with all computers. one direction
ring network
data collection device
commands
Mainframe
10. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
Personal Computers
payload
power supply
virus signature
11. Serves as the interface between the user - the app software - and the computers hardware
network
RFID
system software...
Mobile Computer
12. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
CU
Information system
CAM
hot plugging
13. The process of dividing the disk into tracks and sectors
Notebook Computer
formatting
memory module
proxy server
14. The destructive event or prank the program intended to deliver
telemedicine
PIM
payload
CAD
15. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
hot spot
EULA
access control
streaming
16. Cables - telephone lines - radio networks - satellites
air mouse
Transmission media
streaming cam
chip
17. The code of acceptable behaviors users should follow while on the internet.
program
broadband
Netiquette
peripheral
18. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
drive bay
phishing
TCP/IP
19. Each computer or device on the network. often connected by cables
virus
utility program
node
Linux
20. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
image processing
GPU
RAID
proxy server
21. A legal agreement that allows multiple users to access the software on the server simutaneously
hard disk
System Software...
network license
keygen
22. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
ergonomics
proprietary software...
botnets
fiber optic cable
23. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
RFID
OCR
undervoltage
ghosting
24. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
pointing stick
Dial Up line
EDI
LAN
25. Text version of an IP address
DSL
coaxial cable
Domain name
CAM
26. Circuit boards tjay provide connections and functions not built into the motherboard
adapter cards
worm
Operating system
access time
27. A notcie that guarantees a user or web site is legit. E- commerce use it often
digital certificate
PNG
ROM
http
28. A rectangular opeining that typically holds disk drives.
Trojan Horse
Web conference
Drive Bay
Mainframe
29. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
Storage Device
chasis...
IrDA Port
adapter card
30. The technology of authenticating a persons identity by verifying a personal characteristic.
biometrics
application software...
Application software...
utility programs
31. PGP an encryption program
pretty good Privacy
Denial of Service attack
sending device
digital certificate
32. Operating system on mobile devices that generally resides on ROM
multifunction peripheral
plug- in
embedded operating system
RIMM
33. Fetching - decoding - executing - storing
E- commerce
machine cycle
system on a chip
worm
34. A document that you return to the company that creates and sends it.
touchpad
pretty good Privacy
digital certificate
turnaround document
35. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
star network
access time
mpeg
Storage Media
36. Digital light processor uses tiny mirrors to reflect light
machine cycle
Point of Sale terminals
Plug and Play
DLP projector
37. The number of bits in an area on a storage medium - Higher density means more storage capacity
newsgroup
density
unauthorized access
CPU
38. Controls timing of all computer operations
bit
mashup
cyberterrorist
system clock
39. A system that attempts to imitate the behavior of a human brain.
PIM
neural network
network architecture
streaming cam
40. Other computers and mobile devices on the networ that rely on the server for its resources
device dependant
trackball
client
software suite
41. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
OCR
freeware...
proxy server
RIMM
42. All computers connected to central device. Hub or switch
star network
client/server
Storage Device
biometrics
43. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
CAM
cluster
EULA
expansion bus
44. A part of the motherboard and connects the processor to main memory
Output
system bus
DRAM
hash
45. A real time internet communications service where you can talk to people online.
hibernate
IM
mpeg
peripheral
46. Anopening inside the system unit in which you can install additional equipment. Different than a slot
Bay
streaming cam
address
buffer
47. Dish shaped antenna for internet connection
device independent
RIMM
fault tolerant computer
fixed wireless
48. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
Operating system
System Software...
Internet Backbone
certificate authority
49. Initiates an instruction to transmit data - instructions - or information.
sending device
DSL
CMOS
sleep mode
50. The process if a computer or device recieveing info info from the server on the internet
downloading
botnets
system clock
plug- in