SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Communications activity. Handled by NSFnet.
embedded computer
traffic
Bluetooth
Storage Device
2. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
ALU
fiber optic cable
digital signature
Linux
3. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
document management software...
Memory
CMOS
Dial up modems
4. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
DLP projector
newsreader
disk controller
unethical employees
5. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
business software...
fault tolerant computer
document management software...
superscalar
6. Extends the capabilites of a browser.
plug- in
Latency
SRAM
digital
7. A cable forms a closed loop with all computers. one direction
rootkit
overvoltage
ring network
compromised computer
8. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
Storage Media
mpeg
DSL modem
parallel processing
9. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
certificate authority
phishing
digital signature
optical reader
10. Anopening inside the system unit in which you can install additional equipment. Different than a slot
EDI
byte
Noise
Bay
11. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
MRAM
data collection device
integrated circuit
GUI
12. Small capacity built directly in the processor chip
L1 cache
defragmenting
adapter card
DTP
13. Processor begins to fetch a second instruction before it completes the full machine cycle
spyware
adapter cards
hypertext
pipelining
14. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
CPU
DVI
Application software...
cyberextortionist
15. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
wireless Internet service provider
drive bay
broadband
solid state drive
16. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
hacker
turnaround document
peripheral
hypertext
17. Human speech is bc of its continous signal that vary in strength and quality
access time
analog
RFID
motherboard
18. Uses devices that emit and sense light to detect the mouses movement
peripheral
optical mouse
business software...
Plug and Play
19. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
phishing
ghosting
terminal
fiber optic cable
20. A number that uniquely identifies each computer or device connected to the internet (0-255)
IP address
touchpad
system unit
compromised computer
21. Hypertext transfer protocol
http
Notebook Computer
preemptive multitasking
network architecture
22. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
spoofing
File compression utility
ARPA
chip
23. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
image processing
IM
virus
turnaround document
24. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
worm
System Unit
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
access control
25. System board- is the main circuit board of the system unit.
machine cycle
cold boot
firmware...
motherboard
26. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
script kiddie
network architecture
Processor
buffer
27. Computing device small enough to hold in your hand
Mobile Device
adware
ROM
Input
28. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
L2 cache
Memory
parallel processing
MICR
29. Copyrighted software provided at no cost by company that retains all rights to software
freeware...
macros
formatting
ALU
30. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
sending device
twisted pair cable
proxy server
cracker
31. Sends digital data and info from a comp to a DSL line
pipelining
Application software...
DSL modem
business software...
32. Someone who uses internet to destroy or damage computers for political reasons.
pipelining
cyberterrorist
player
tactile output
33. zombie
telesurgery
compromised computer
Domain name system
USB port
34. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
freeware...
network standard
hard disk
Home user
35. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
Laser printer
gender changer
digital signature
UNIX
36. A rectangular opeining that typically holds disk drives.
Drive Bay
hard disk
Storage Media
Home user
37. A colection of individual programs available together as a unit. lower cost and ease of use
hard disk
dot matrix printer
adware
software suite
38. A collection of data organized in a manner that allows access retrieval and use of that data
program
SMTP
virtual provate network
database
39. Connects the processor to cache.
backside bus
fiber optic cable
Dial up modems
Noise
40. Saves any open documents and programs to RAM and places computer into a low power state
W3C
coaxial cable
sleep mode
Mobile Computer
41. Case of the system unit to protect internal damage
site license
chasis...
E- commerce
WAN
42. Other computers and mobile devices on the networ that rely on the server for its resources
client
animated Gif...
streaming cam
bugs
43. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
project management software...
e- learning
server
hot spot
44. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
CPU
embedded operating system
port
IrDA Port
45. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
disk cleanup
proxy server
microbrowser
System Software...
46. Designed for mobile devices
document management software...
digital certificate
plaintext
microbrowser
47. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
SIMM
product activation
dot matrix printer
Storage Media
48. Two or more computers transfer data - instructions - and information.
wireless access point
communications
E- retail
ASCII
49. Internet Service Provider- a regional or national access provider
SIMM
Output
ISP
cloud storage
50. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
Software...
bandwidth
coaxial cable
Domain name system