SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
warm boot
honeypot
CMOS
server
2. Smallest unit of data the computer can process
bit
E- commerce
heat sink
hibernate
3. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
pretty good Privacy
Application software...
power supply
adware
4. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
VR
noise
adapter cards
L2 cache
5. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
supercomputer
Storage Media
download
utility programs
6. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
proxy server
terminal
dot matrix printer
application software...
7. The destructive event or prank the program intended to deliver
payload
CAPTCHA
e- learning
mashup
8. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
broadband
program
newsgroup
EDI
9. When online meetings take place on the web
multi- core processor
port
Web conference
Content Aggregator
10. Major carriers of network traffic
drive bay
cracker
Internet Backbone
DSL
11. Local area network- network tat connects computers and devices in a limited geographical area such as a home
LAN
Laser printer
ring network
cable modem
12. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
Domain name system
RFID
MMS
player
13. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
bandwidth
coaxial cable
spooling
chat client
14. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
data collection device
Memory Cache
E- commerce
multi- core processor
15. Dynamic ram- chips must be re energized constantly or they lose their contents.
Fiber to the Premises
system on a chip
DRAM
Domain name
16. Continues to operate when one of its components fails - ensuring that no data is lost
telemedicine
embedded operating system
audit trail
fault tolerant computer
17. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
Storage Media
chasis...
system bus
online security service
18. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
network topology
video card
address
undervoltage
19. Has the illusion of moving images becuase it sends a continuos stream of images
Terminal
Output
bus width
streaming cam
20. Transmission media on which the data - instructions - information travel.
device dependant
project management software...
communications channel
DIMM
21. Computer aided design software assists a professional user in creating designs
density
register
ISP
CAD
22. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
optical reader
hypertext
Linux
DVI
23. Smallest element in an electronic image
Domain name
back door
Personal Computers
pixel
24. Can connect multiple types of devices that require faster data transmission speeds.
FireWire port
bugs
spoofing
cross - platform
25. A cable forms a closed loop with all computers. one direction
Input
fixed wireless
ring network
TCP/IP
26. Popular for LAN. single central cable.
kernal
bus network
System Software...
Web Application
27. Program is one that runs the same on multiple operating systems
GUI
corporate spies
cross - platform
network standard
28. Random access memory- memory chips that can be read from and written to by the processor and other devices
software suite
RAM
communications
database
29. 8 bits grouped together. basic storage unit in memory. Each byte has an address
address
byte
database
wireless modem
30. A type of storage media that consists of flat disc and is written and read by a laser
chat client
EFT
cloud storage
optical disc
31. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
scanner
Drive Bay
Information system
telesurgery
32. They can execute more than one instruction per clock cycle
TLS
density
superscalar
multifunction peripheral
33. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
Desktop Computer
server
download
corporate spies
34. Computer automatically can configure adapter cards and other peripherals as you install them
mashup
adapter cards
Plug and Play
Point of Sale terminals
35. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
video card
utility programs
broadband
spyware
36. Accepts the transmission of data - instructions - or info
parallel processing
adware
wireless modem
recieving device
37. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
thread
worm
terminal
bandwidth
38. Is a security measure that defines who can access it and what actions they can take while acessing the computer
access control
wireless access point
solid state drive
density
39. Internet teephony- enables users to speak to other users over the internet
optical disc
VoIP
coaxial cable
system unit
40. Federally funded internet security research and development center
CPU
Netiquette
disk controller
CERT/CC
41. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
compromised computer
Domain name system
bus network
platter
42. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
product activation
Dedicated line
nonvolatile memory
WAN
43. Dual inline memory module forms two sets of contact
DIMM
firmware...
LAN
Web Application
44. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
recieving device
bus
pretty good Privacy
public- domain software...
45. Two main parts are processor and memory.
Motherboard
phishing
RIMM
gender changer
46. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
TCP/IP
turnaround document
E- commerce
Storage Device
47. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
EFT
image processing
mashup
microbrowser
48. Integrates the functions of a processor - memory and a video card on a single chip.
RSS 2.0
RAM
system on a chip
spooling
49. A type of system software that allows users to perform maintenence type tasks
utility program
Content Aggregator
CMOS
public- domain software...
50. Copyrighted software provided at no cost by company that retains all rights to software
freeware...
EDI
Internet Backbone
compromised computer