SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Continues to operate when one of its components fails - ensuring that no data is lost
fault tolerant computer
Memory
IM
expansion bus
2. A web application that combines services from two or more sources creating a new application.
mashup
solid state drive
access time
dot matrix printer
3. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
Bluetooth
OMR
VAN
disk fragmenter
4. Searches for and removes unneccessary files
image processing
disk cleanup
plaintext
public- domain software...
5. Allows users to keep typing without using enter at the end of each line
digital signature
software suite
RIMM
wordwrap
6. Health care professions conduct live conferences on the computer
trackball
telemedicine
Software...
worm
7. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
NAS
DVI
Transmission media
macros
8. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
disk controller
Input
DSL modem
Fiber to the Premises
9. Smallest unit of data the computer can process
honeypot
bit
jewel box
network standard
10. Mathematical formula that generates a code from the contents of the message
ALU
Mobile Computer
document management software...
hash
11. Screen savors were made to prevent this - which etched images permanently onto the screen
FireWire port
Terminal
ghosting
cross - platform
12. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
CPU
peer to peer network
document management software...
Information system
13. Rambus inline memory module house RDRAM chips
supercomputer
public- domain software...
RIMM
system software...
14. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
network topology
utility program
macros
pixel
15. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
PNG
Web Browser
Content Aggregator
fault tolerant computer
16. Small program that tells the operating system how to communicate with a specific device
DTP
driver
Firewall
NAS
17. Retains existing application software and data files even if you can change computer models or vendors
device independent
online auction
ghosting
chasis...
18. They consist entirely of electronic components and contain no moving parts.
solid state media
animated Gif...
unethical employees
wireless Internet service provider
19. Single chip with two or more processor cores.
digital forensics
multi- core processor
adware
sound card
20. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
cross - platform
ergonomics
Motherboard
network topology
21. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
Application software...
power supply
Web Browser
virtual provate network
22. All computers connected to central device. Hub or switch
802.11
RAM
star network
sound card
23. Consists of electronic components that store instructions waiting to be executed (On motherboard)
Memory
undervoltage
bit
memory module
24. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
UNIX
DSL modem
VR
heat sink
25. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
solid state media
GPU
Operating system
hacker
26. Has the illusion of moving images becuase it sends a continuos stream of images
online security service
Web Server
streaming cam
dot matrix printer
27. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
OMR
liquid flow technology
Mobile Device
system on a chip
28. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
capacity
MRAM
cable modem
Memory Cache
29. The process of dividing the disk into tracks and sectors
POP3
Home user
formatting
client/server
30. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
VR
plug- in
Drive Bay
network card
31. Computer aided design software assists a professional user in creating designs
Desktop Computer
Bay
CAD
ethernet
32. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
compromised computer
air mouse
formatting
defragmenting
33. A set of programs that coordinates all of the activies among computer hardware devices.
Operating system
Mobile Computer
transistor
certificate authority
34. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
MMS
buffer
wordwrap
peer to peer network
35. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
proxy server
defragmenting
sound card
CAPTCHA
36. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
document management software...
parallel processing
memory module
E- retail
37. When businesses use the internet to sell products
peer to peer network
fault tolerant computer
image processing
E- retail
38. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
cyberextortionist
nonvolatile memory
site license
groupware...
39. A real time internet communications service where you can talk to people online.
IM
Bluetooth
driver
heat pipe
40. A small flat rectangular pointing device that is sensitive to pressure and motion.
backside bus
synthesizer
dot matrix printer
touchpad
41. A collection of data organized in a manner that allows access retrieval and use of that data
compromised computer
database
multifunction peripheral
Laser printer
42. The discovery - collection adn analysis of evidence found on computers and networks
pretty good Privacy
Motherboard
power supply
digital forensics
43. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
peer to peer network
OCR
Software...
multifunction peripheral
44. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
telesurgery
system bus
EULA
utility programs
45. Links in text based documents
Intrusion detection software...
hypertext
kernal
TCP/IP
46. Hypertext transfer protocol
CAM
gender changer
http
back door
47. Pressure sensitive eraser shaped pointing device
Bluetooth
pointing stick
compromised computer
hot plugging
48. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
digital certificate
client
ASCII
unauthorized access
49. A socket in the motherboard that can hold an adapter card
stored program concept
expansion slot
Output
ROM
50. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
Memory Cache
turnaround document
RTLS
botnets
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests