Test your basic knowledge |

Technology In Action - 2

Subjects : it-skills, literacy
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The most popular transmission media option for Ethernet networks. UTP cable is composed of four pairs of wires that are twisted around each other to reduce electrical interference.

2. A user interface in which the user chooses a command from menus displayed on the screen.

3. A type of network in which users are responsible for creating their own data backups and for providing security for their computers.

4. The set of computer programs or instructions that tells the computer what to do and enables it to perform different tasks.

5. 'A device that combines the functionality of a cell phone - a PMP - and a PDA into one unit.'

6. The percentage of time a central processing unit (CPU) is working.

7. A drive that uses the same kind if memory that flash drives use - but can reach data in only a tenth of the time a flash drive requires.

8. A topology comprised of several topologies and combined into one network.

9. 'The main tool for finding - viewing - and managing the contents of your computer by showing the location and contents of every drive - folder - and file.'

10. A printer that sprays ink or uses laser beams to make marks on the paper. The most common nonimpact printers are inkjet and laser printers.

11. How a user sets up his or her computer and other equipment to minimize risk of injury or discomfort.

12. The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high-tech crime.

13. A type of audio processing that makes the listener experience sound as if it were coming from all directions.

14. The set of techniques used in processing and retrieving information.

15. An agreement between the user and the software developer that must be accepted before installing the software on a computer.

16. A temporary storage area on the hard drive where the operating system 'swaps out' or moves the data or instructions from random access memory (RAM) that have not recently been used. This process takes place when more RAM space is needed.

17. A network made up of local area networks (LANs) connected over long distances.

18. A heavily secured server located on a special perimeter network between a company's secure internal network and its firewall.

19. A network name that wireless routers use to identify themselves.

20. A specialized computing device designed to store and manage network data.

21. A server that keeps track of who is logging on to the network and which services on the network are available to each user.

22. A network made up of local area networks (LANs) connected over long distances.

23. A special numerical code that prioritizes requests from various devices. These requests then are placed in the interrupt table in the computer's primary memory.

24. A notebook computer designed specifically to work with handwriting recognition technology.

25. BD-ROM is defined as BluRay Disc Read Only Memory. BD-ROM is an optical disc storage media format for high-definition video and data storage.

26. A computer deployed to provide remote storage space or to act as a repository for files that users can access.

27. The set of programs that enables a computer's hardware devices and application software to work together; it includes the operating system and utility programs.

28. A signal that tells the operating system that it is in need of immediate attention.

29. A device that allows you to capture sound waves - such as those created by your voice - and transfer them to digital format on your computer.

30. Documentation for a software product that is built directly into the software.

31. A hardware device that uses lasers or light to read from - and maybe even write to - CDs - DVDs - or Blu-ray discs.

32. See eSata.

33. A software holding area for printing jobs.

34. A network that uses the Ethernet protocol as the means (or standard) by which the nodes on the network communicate.

35. The language computers use to process data into information - consisting of only the values 0 and 1.

36. A mouse that uses an internal sensor or a laser to conrtol the mouse's movement. The sensor sends signals to the computer - telling it where to move the pointer on the screen.

37. A drive that plugs into a universal serial bus(USB) port on a computer and stores data digitally. Also called USB drive - jump drive - or thumb drive.

38. The system software the controls the way in which a computer system functions - including the management of hardware - peripherals - and software.

39. 'Someone who has training in computer and peripheral maintenance and repair - network design - and the installation of network software; installs new equipment - configures computers for users - repairs equipment - and assigns network access to users

40. 'Permanent storage - as in read-only memory (ROM).'

41. A device (such as a printer or external hard drive) that can be attached directly to a network instead of needing to attach to a computer on the network.

42. A power-management mode that saves the current state of the current system to the computer's hard drive.

43. DVD format in which data can only be read and not written.

44. The process of swapping data or instructions that have been placed in the swap file for later use back into active random access memory (RAM). The contents of the hard drive's swap file then become less active data or instructions.

45. A design in newer routers that provides for faster wireless data transmission by utilizing more than one antenna to transmit and receive data.

46. The set of computer programs or instructions that tells the computer what to do and enables it to perform different tasks.

47. 'An attack delivered by specialized hacking software that tries many combinations of letters - numbers - and pieces of a user ID in an attempt to discover a user password.'

48. Programs for editing photographs and other images.

49. System software that controls hardware devices.

50. A program that manages the data between a computer's operating system and all the input and output devices attached to the computer; also responsible for loading the operating system (OS) from its permanent location on the hard drive to random access