SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cables - telephone lines - radio networks - satellites
site license
terminal
Transmission media
bandwidth
2. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
Dial up modems
RSS 2.0
public- domain software...
peripheral
3. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
Memory Cache
cyberextortionist
adapter card
client
4. Links in text based documents
hot plugging
hypertext
motherboard
hot spot
5. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
proxy server
L2 cache
PNG
Processor
6. Device with a monitor - keyboard - and memory
Terminal
Noise
e- learning
peer to peer network
7. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
Software...
server
EFT
hard disk
8. (laptop computer) portable personal computer often able to fit in your lap
pointing stick
Operating system
star network
Notebook Computer
9. A computer that delivers requested web pages to your computer
system on a chip
Web Server
virus
telesurgery
10. Transmits data via infared light waves.. Both computer and device must have the port for it to work
undervoltage
scanner
IrDA Port
machine cycle
11. Data that has been processed in a useful form- text - graphics - audio - video
Output
coaxial cable
drive bay
IM
12. Has the illusion of moving images becuase it sends a continuos stream of images
hash
Output
streaming cam
System Software...
13. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
product activation
terminal
optical disc
wireless access point
14. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
Web Browser
Dial up modems
digital modem
ergonomics
15. A web application that combines services from two or more sources creating a new application.
commands
digital certificate
cluster
mashup
16. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
IM
commands
adware
hacker
17. One or more computers on the network request services from the server. 10 or more computers
overvoltage
client/server
ergonomics
Web Application
18. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
recieving device
preemptive multitasking
jack
pointing stick
19. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
air mouse
EULA
Dedicated line
motherboard
20. Graphics processing unit controls the manipulation and display of graphics on the display device.
liquid flow technology
document management software...
recieving device
GPU
21. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
Storage Media
plaintext
backside bus
DSL
22. Allows the processor to communicate with peripherals.
expansion bus
buffer
network topology
EFT
23. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
online security service
Storage Device
ISP
DRAM
24. Short for key generator creats software registration numbers and sometimes activation codes.
chip
USB port
undervoltage
keygen
25. A device that enables you to join a port and a connector that are both male or female
telesurgery
gender changer
DRAM
access time
26. A number that uniquely identifies each computer or device connected to the internet (0-255)
Notebook Computer
CAPTCHA
IP address
router
27. Accepts the transmission of data - instructions - or info
access time
recieving device
microbrowser
digital certificate
28. The design of computers - devices - and media in the network
network architecture
supercomputer
virus signature
digital modem
29. The original article and all subsequent related replies
cyberterrorist
OMR
Trojan Horse
thread
30. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
Information system
power supply
address
sleep mode
31. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
spoofing
warm boot
database
plug- in
32. The use of computer or network with out permission
ghosting
cross - platform
jack
unauthorized access
33. Type of notebook comp that is smaller and less powerful than a normal notebook comp
spoofing
neural network
gender changer
Netbook
34. When businesses use the internet to sell products
plug- in
E- retail
jack
scanner
35. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
coaxial cable
memory module
MAN
adapter cards
36. Provide Wi Fi to mobile computers or devices
Latency
Hot spots
synthesizer
memory module
37. Consumer consumer e commerce.
sleep mode
online auction
pointing stick
Trojan Horse
38. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
USB hub
heat sink
Mainframe
product activation
39. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
access time
ethernet
EFT
UNIX
40. Small capacity built directly in the processor chip
L1 cache
honeypot
chat client
address
41. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
ALU
DSL
connector
cracker
42. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
Information system
RSS 2.0
program
Web Browser
43. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
rootkit
Home user
digital signature
network standard
44. Moving pictures experts group is a popular video compression standard
access time
mpeg
Intrusion detection software...
OMR
45. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
access control
MICR
heat sink
Dial Up line
46. The technology of authenticating a persons identity by verifying a personal characteristic.
biometrics
Fiber to the Premises
pipelining
botnets
47. Company that provides wireless internet access to computers
wireless Internet service provider
crimeware
sound card
tactile output
48. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
L2 cache
trackball
solid state media
nonvolatile memory
49. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
OCR
synthesizer
back door
CPU
50. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
byte
dot matrix printer
virus
MMS