SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Storage over an internet service
Storage Device
adapter cards
cloud storage
Dial- up access
2. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
CPU
E- commerce
cyberextortionist
Notebook Computer
3. Basic input/output systemis firmware that contains the computers startup instructions
BIOS
utility programs
bit
integrated circuit
4. Privately owned and limited to a specific vendor or computer model.
expansion bus
L2 cache
peripheral
proprietary software...
5. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
ASCII
router
PNG
unauthorized access
6. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
connector
spider
DTP
overvoltage
7. On the motherboard hold memory modules
image processing
memory slots
Communications device
database
8. Holds one or more disk drives
BIOS
drive bay
VAN
solid state media
9. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
Memory Cache
SIMM
cold boot
VR
10. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
program
back door
RAM
chip
11. Instead of port - jack is used to identify audio or video ports.
node
jack
network card
DNS Server
12. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
cyberterrorist
product activation
ROM
RFID
13. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
hibernate
RSS 2.0
bus
access time
14. Enahnces the sound generating capabilites of a personal computer
expansion bus
ASCII
sound card
liquid flow technology
15. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
wireless modem
Dial up modems
MAN
online security service
16. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
warm boot
online security service
network card
MRAM
17. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
pretty good Privacy
botnets
IP address
Application software...
18. A communications device that enables a computer or device that does not have a built in networking capability to access a network
E- commerce
web filter
network card
ARPA
19. May break in to computer to exploit security weakness. financial gains - revenge.
message board
unethical employees
Terminal
Dial Up line
20. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
embedded operating system
ROM
spyware
noise
21. A collection of computers and devices connected together - via communications devices and transmissions media.
bit
network
solid state media
Denial of Service attack
22. A program that hides in a computer and allows someone from a remote location to take control of the computer
rootkit
broadband
pipelining
public- domain software...
23. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
Web Browser
EULA
VoIP
program
24. Device with a monitor - keyboard - and memory
stylus
Trojan Horse
ARPA
Terminal
25. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
File compression utility
BIOS
Operating system
Linux
26. Local area network- network tat connects computers and devices in a limited geographical area such as a home
embedded computer
LAN
turnaround document
GPU
27. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
utility program
Desktop Computer
neural network
network license
28. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
ARPA
sleep mode
MRAM
cold boot
29. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
EDI
Servers
unethical employees
adapter card
30. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
tactile output
EULA
POST
virus
31. Copyrighted software provided at no cost by company that retains all rights to software
Netbook
freeware...
Operating system
Memory
32. Used to gain competitive advantage
CPU
downloading
corporate spies
Information system
33. Anopening inside the system unit in which you can install additional equipment. Different than a slot
turnaround document
synthesizer
Bay
defragmenting
34. Surgeon performs operation by controlling robot when not in the same area as patient.
telesurgery
DSL modem
cracker
broadband
35. Records in a file both successful and unsuccessful attempts.
GUI
audit trail
pointing stick
RFID
36. Popular for LAN. single central cable.
system bus
register
DVI
bus network
37. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
hypermedia
fiber optic cable
virus
wordwrap
38. The amount of data - instructions - and information that can travel over communications channel
newsgroup
network
Plug and Play
bandwidth
39. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
PIM
Software...
Latency
System Unit
40. Mathematical formula that generates a code from the contents of the message
drive bay
hash
ISP
ethernet
41. Most computers (on and off)
Mobile Device
Laser printer
bus
digital
42. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
wireless modem
liquid flow technology
superscalar
hypermedia
43. Transmits data via infared light waves.. Both computer and device must have the port for it to work
animated Gif...
hypermedia
ciphertext
IrDA Port
44. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
fiber optic cable
CPU
Software...
peer to peer network
45. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
mpeg
corporate spies
MICR
multi- core processor
46. Computer automatically can configure adapter cards and other peripherals as you install them
honeypot
multi- core processor
Plug and Play
OSP
47. Random access memory- memory chips that can be read from and written to by the processor and other devices
Web conference
ethernet
FireWire port
RAM
48. Small program that tells the operating system how to communicate with a specific device
driver
ring network
hot plugging
gender changer
49. When turning on a computer that has been turned off completly
Laser printer
platter
cold boot
traffic
50. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
Input
kernal
superscalar
access control