SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
overvoltage
heat sink
trackball
IrDA Port
2. Combines several GIF images ina single GIF file.
ALU
warm boot
chasis...
animated Gif...
3. Company that provides wireless internet access to computers
microbrowser
bus network
client/server
wireless Internet service provider
4. Instead of port - jack is used to identify audio or video ports.
jack
network standard
ethernet
SMTP
5. Extends the capabilites of a browser.
DVI
USB hub
analog
plug- in
6. Short for key generator creats software registration numbers and sometimes activation codes.
keygen
Notebook Computer
Dedicated line
network
7. Small capacity built directly in the processor chip
cold boot
Top level domain
Trojan Horse
L1 cache
8. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
commands
hypermedia
Memory
Application software...
9. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
virus
disk fragmenter
SRAM
mpeg
10. Allows the processor to communicate with peripherals.
proxy server
digital
http
expansion bus
11. Completely Automated Public Turing test to tell Computers and Humans Apart.
CAPTCHA
sleep mode
e- learning
LAN
12. A legal agreement that allows multiple users to access the software on the server simutaneously
sound card
network license
spyware
digital certificate
13. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
video card
shareware...
MICR
cold boot
14. Type of notebook comp that is smaller and less powerful than a normal notebook comp
Netbook
EFT
peer to peer network
volatile memory
15. A small flat rectangular pointing device that is sensitive to pressure and motion.
transistor
digital forensics
touchpad
system software...
16. Errors that can be recognized by automatic update
Firewall
router
groupware...
bugs
17. Privately owned and limited to a specific vendor or computer model.
VoIP
utility programs
proprietary software...
chip
18. A family member on a computer
Home user
DSL
TCP/IP
site license
19. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
mashup
honeypot
CERT/CC
Storage Device
20. A number that uniquely identifies each computer or device connected to the internet (0-255)
IP address
VoIP
VAN
communications
21. Personal information manager is application software that includes features to help users organize personal info
PIM
driver
virus signature
tactile output
22. Acts as an electronic switch that opens or closes the circuit for electrical charges
digital
transistor
Domain name
OCR
23. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
heat pipe
WAN
DRAM
hot plugging
24. Does not require a newsreader - easier to use than a newsgroup
spooling
http
kernal
message board
25. Software used by criminals
Latency
SIMM
hard disk
crimeware
26. When businesses use the internet to sell products
EFT
wireless modem
E- retail
backside bus
27. A notcie that guarantees a user or web site is legit. E- commerce use it often
Trojan Horse
hacker
DSL
digital certificate
28. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
VR world
E- retail
disk cleanup
ASCII
29. Graphics processing unit controls the manipulation and display of graphics on the display device.
video card
Domain name
GPU
e- learning
30. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
system software...
Mobile Device
Trojan Horse
RAID
31. A small metal or plastic device that uses pressure instead of ink.
stylus
device independent
formatting
wireless modem
32. Can be peropheral or chip - creates sound from digital instructions.
Plug and Play
synthesizer
utility programs
L1 cache
33. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
RAID
Noise
warm boot
streaming cam
34. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
optical reader
Communications device
MRAM
overvoltage
35. The technology of authenticating a persons identity by verifying a personal characteristic.
Drive Bay
biometrics
recieving device
neural network
36. Picure messaging can occur from mobile to mobile and mobile to email
EULA
MMS
Operating system
solid state media
37. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
RTLS
token ring
CU
utility programs
38. Any unwanted signal usually varying quickly
byte
Noise
virtual provate network
ciphertext
39. Unencrypted readable data
spoofing
plaintext
bit
RIMM
40. Someone who uses internet to destroy or damage computers for political reasons.
cyberterrorist
network license
botnets
Trojan Horse
41. Is an online area in which isers have wrtten discussions about a particular subject.
newsgroup
compromised computer
bus
EDI
42. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
Operating system
embedded computer
GPU
newsgroup
43. A type of always on connection that is established between two communications devices. better than dial up line
Dedicated line
DNS Server
disk controller
document management software...
44. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
liquid flow technology
hot spot
image processing
stylus
45. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
download
kernal
TLS
certificate authority
46. A special purpose computer that functions as a component in a larger product. Small with limited hardware
worm
Web Application
embedded computer
buffer
47. Two main parts are processor and memory.
turnaround document
keygen
disk cleanup
Motherboard
48. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
CAD
wireless Internet service provider
software suite
application software...
49. Any data or instructions entered into the memory of the computer
Input
site license
Servers
proxy server
50. They consist entirely of electronic components and contain no moving parts.
digital certificate
CAD
solid state media
turnaround document