SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Unencrypted readable data
image processing
GPU
jack
plaintext
2. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
DLP projector
scanner
server
DRAM
3. Graphic file (JPEG - GIF) slowly replacing GIF
E- retail
OMR
spyware
PNG
4. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
LAN
application software...
chip
tactile output
5. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
Transmission media
SMTP
virtual provate network
embedded computer
6. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
pretty good Privacy
Latency
jack
preemptive multitasking
7. The code of acceptable behaviors users should follow while on the internet.
microbrowser
SIMM
port
Netiquette
8. A collection of data organized in a manner that allows access retrieval and use of that data
database
FireWire port
network architecture
payload
9. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
access time
Memory Cache
TLS
kernal
10. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
disk controller
commands
buffer
chip
11. The fastest most powerful computer
formatting
optical disc
fault tolerant computer
supercomputer
12. 8 bits grouped together. basic storage unit in memory. Each byte has an address
audit trail
hot plugging
pipelining
byte
13. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
token ring
digital certificate
defragmenting
MMS
14. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
CMOS
density
hypertext
Trojan Horse
15. Holds one or more disk drives
back door
drive bay
audit trail
Storage Media
16. Serves as the interface between the user - the app software - and the computers hardware
system software...
peripheral
Linux
terminal
17. A part of the motherboard and connects the processor to main memory
network card
bit
Desktop Computer
system bus
18. When online meetings take place on the web
Web conference
E- retail
sleep mode
compromised computer
19. They can execute more than one instruction per clock cycle
superscalar
Dial- up access
pretty good Privacy
MICR
20. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
POST
TLS
Memory
capacity
21. Dish shaped antenna for internet connection
protocol
system on a chip
Content Aggregator
fixed wireless
22. The standard that outlines characteristics of how two network devices communicate
cold boot
protocol
node
Bluetooth
23. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
machine cycle
DNS Server
downloading
sending device
24. Is a security measure that defines who can access it and what actions they can take while acessing the computer
digital modem
access control
access time
platter
25. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
802.11
telemedicine
Software...
Denial of Service attack
26. All computers connected to central device. Hub or switch
Processor
network card
star network
macros
27. Text version of an IP address
Domain name
ring network
touchpad
site license
28. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
CMOS
cracker
MICR
program
29. A know specific pattern of virus code.
virus signature
honeypot
address
USB hub
30. Basic input/output systemis firmware that contains the computers startup instructions
BIOS
warm boot
E- retail
Dial Up line
31. A device that enables you to join a port and a connector that are both male or female
chip
gender changer
Intrusion detection software...
pipelining
32. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
Domain name system
MAN
Firewall
system clock
33. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
SIMM
RFID
bit
hypermedia
34. The destructive event or prank the program intended to deliver
rootkit
Web Server
message board
payload
35. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
e- learning
MRAM
trackball
turnaround document
36. Combines several GIF images ina single GIF file.
animated Gif...
bit
Drive Bay
VoIP
37. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
Desktop Computer
Linux
address
memory module
38. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
air mouse
Plug and Play
L2 cache
Terminal
39. Hardware - software - data - people - procedures
Information system
Operating system
protocol
SMTP
40. Surgeon performs operation by controlling robot when not in the same area as patient.
jewel box
telesurgery
solid state media
Domain name
41. Optical mark recognition reads hand drawn marks such as circles or rectangles.
L1 cache
defragmenting
UNIX
OMR
42. Graphics processing unit controls the manipulation and display of graphics on the display device.
honeypot
RAM
IP address
GPU
43. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
spooling
disk controller
RAM
DSL modem
44. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
unauthorized access
optical reader
pixel
multifunction peripheral
45. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
Memory Cache
volatile memory
drive bay
download
46. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
twisted pair cable
disk cleanup
Motherboard
system software...
47. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
Personal Computers
virtual provate network
Hot spots
Dial- up access
48. The last section of the domain name
disk controller
expansion slot
FireWire port
Top level domain
49. Power on self test to check the various system components and the results are compared with data in a CMOS chip
communications
firmware...
POST
parallel processing
50. Hides within or looks like a legitimate program such as a screen saver
spyware
TCP/IP
turnaround document
Trojan Horse
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests