SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
twisted pair cable
MICR
UNIX
site license
2. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
NAS
adware
Latency
System Unit
3. A communications device that sends and recieves data and info to and from digital line
USB port
ring network
document management software...
digital modem
4. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
capacity
unethical employees
wireless modem
network
5. Computing device small enough to hold in your hand
hash
Netbook
Mobile Device
network license
6. Local area network- network tat connects computers and devices in a limited geographical area such as a home
sending device
downloading
LAN
POP3
7. A special purpose computer that functions as a component in a larger product. Small with limited hardware
plug- in
cyberterrorist
wireless Internet service provider
embedded computer
8. Two or more computers transfer data - instructions - and information.
communications
unethical employees
fault tolerant computer
DRAM
9. Hides within or looks like a legitimate program such as a screen saver
Trojan Horse
online security service
Desktop Computer
power supply
10. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
business software...
Mobile Device
bugs
IP address
11. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
Intrusion detection software...
project management software...
traffic
LAN
12. Single chip with two or more processor cores.
multi- core processor
OSP
CAD
corporate spies
13. Instead of port - jack is used to identify audio or video ports.
hash
jack
corporate spies
virtual provate network
14. Data that has been processed in a useful form- text - graphics - audio - video
Memory
groupware...
broadband internet service
Output
15. Method that the internet uses to store domain names and their corressponding IP addresses
software suite
business software...
peer to peer network
Domain name system
16. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
sleep mode
UNIX
digital signature
Drive Bay
17. A legal agreement that allows multiple users to access the software on the server simutaneously
network license
embedded computer
OSP
unethical employees
18. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
heat sink
L2 cache
defragmenting
DVI
19. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
fault tolerant computer
TCP/IP
system bus
pointing stick
20. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
streaming
EULA
hibernate
Communications device
21. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
CAD
E- commerce
bus
CU
22. A rectangular opeining that typically holds disk drives.
Drive Bay
hacker
Bay
ring network
23. Loses its contents when power is turned off (RAM)
volatile memory
TLS
phishing
network
24. A type of system software that allows users to perform maintenence type tasks
Storage Device
adapter cards
utility program
wireless access point
25. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
overvoltage
animated Gif...
Mainframe
Desktop Computer
26. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
streaming
Notebook Computer
expansion bus
sound card
27. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
FireWire port
mashup
adapter cards
kernal
28. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
cable modem
utility program
PNG
CPU
29. Picure messaging can occur from mobile to mobile and mobile to email
MMS
sending device
Output
NAS
30. Rambus inline memory module house RDRAM chips
cold boot
network
broadband internet service
RIMM
31. Small program that tells the operating system how to communicate with a specific device
disk cleanup
turnaround document
software suite
driver
32. Contain permanently writeen data - instructions - and information
LAN
firmware...
Information system
system on a chip
33. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
wireless access point
CU
network
registrar
34. Communications activity. Handled by NSFnet.
traffic
MRAM
SMTP
Servers
35. A small metal or plastic device that uses pressure instead of ink.
unauthorized access
Output
hash
stylus
36. Organization that sells and manages domain names
Input
system clock
registrar
Web conference
37. Major carriers of network traffic
streaming
Internet Backbone
ASCII
payload
38. Uses radio waves to transmit data between two devices.
hibernate
Bluetooth
Software...
Content Aggregator
39. Uses devices that emit and sense light to detect the mouses movement
optical mouse
Trojan Horse
network
gender changer
40. Anopening inside the system unit in which you can install additional equipment. Different than a slot
twisted pair cable
peer to peer network
freeware...
Bay
41. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
hot plugging
adapter cards
network standard
streaming cam
42. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
DVI
recieving device
device dependant
proxy server
43. Acts as an electronic switch that opens or closes the circuit for electrical charges
sleep mode
disk fragmenter
transistor
Software...
44. Most computers (on and off)
chat client
ROM
digital
Servers
45. Electrical supply drops.can cause data loss but generally not cause equipment damage
spooling
undervoltage
document management software...
DLP projector
46. Is a security measure that defines who can access it and what actions they can take while acessing the computer
DSL modem
proprietary software...
access control
L2 cache
47. Media transmit multiple signals simutaneously. Download faster than upload
broadband
spooling
fixed wireless
EULA
48. Internet connections using regular copper telephone lines.
site license
DSL
Operating system
embedded computer
49. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
groupware...
protocol
GUI
MRAM
50. Health care professions conduct live conferences on the computer
telemedicine
Trojan Horse
RTLS
GUI