SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Single inline memory module forms a single set of contacts
SIMM
parallel processing
Servers
CPU
2. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
twisted pair cable
L1 cache
bus width
firmware...
3. The use of computer or network with out permission
client
UNIX
unauthorized access
E- retail
4. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
Memory
software suite
IrDA Port
superscalar
5. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
network
ergonomics
Dedicated line
device independent
6. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
disk controller
IM
L1 cache
EDI
7. The technology of authenticating a persons identity by verifying a personal characteristic.
biometrics
utility programs
volatile memory
online auction
8. Designed for mobile devices
peripheral
protocol
microbrowser
jewel box
9. The role of memory to store both data and programs
Servers
stored program concept
USB port
network architecture
10. Used to track and identify the location of high risk or high value items.
ciphertext
RTLS
RAID
tactile output
11. A vulnerable computer that is set up to entice an intruder to break into it.
optical disc
honeypot
DLP projector
Software...
12. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
superscalar
Storage Device
hibernate
UNIX
13. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
Personal Computers
adapter card
worm
platter
14. Text version of an IP address
register
wireless modem
Dial- up access
Domain name
15. A notcie that guarantees a user or web site is legit. E- commerce use it often
twisted pair cable
digital certificate
keygen
drive bay
16. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
overvoltage
synthesizer
ALU
Denial of Service attack
17. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
MRAM
coaxial cable
Fiber to the Premises
RAID
18. An instruction that causes a program to perform a specific action.
commands
network
adapter cards
program
19. Perpetrator attempts to obtain your personal or financial info.
phishing
optical disc
transistor
Trojan Horse
20. Uses fiber optic cable for internet connection.
Fiber to the Premises
online auction
peripheral
communications channel
21. Hypertext transfer protocol
http
System Software...
web filter
Linux
22. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
jack
newsreader
noise
DTP
23. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
keygen
pretty good Privacy
Input
hypermedia
24. Extends the capabilites of a browser.
scanner
phishing
preemptive multitasking
plug- in
25. Transmission media on which the data - instructions - information travel.
Web Server
device dependant
EDI
communications channel
26. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
audit trail
Content Aggregator
DNS Server
air mouse
27. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
disk fragmenter
access control
hash
Dial up modems
28. Acts as an electronic switch that opens or closes the circuit for electrical charges
neural network
transistor
pointing stick
File compression utility
29. Pressure sensitive eraser shaped pointing device
DRAM
platter
project management software...
pointing stick
30. A personal computer you can carry from place to place
Mobile Computer
touchpad
network architecture
optical disc
31. Program is one that runs the same on multiple operating systems
network topology
communications
IM
cross - platform
32. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
worm
Web Browser
buffer
Personal Computers
33. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
program
sound card
crimeware
Home user
34. A rectangular opeining that typically holds disk drives.
Drive Bay
animated Gif...
online auction
Netbook
35. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
digital signature
backside bus
motherboard
L2 cache
36. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
newsreader
EFT
ethernet
access time
37. A program that restricts access to certain material on the web
chip
Noise
peripheral
web filter
38. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
ciphertext
Communications device
Trojan Horse
Noise
39. Communications activity. Handled by NSFnet.
E- retail
product activation
traffic
L2 cache
40. Power on self test to check the various system components and the results are compared with data in a CMOS chip
UNIX
POST
corporate spies
integrated circuit
41. A collection of computers and devices connected together - via communications devices and transmissions media.
network
hacker
DSL
public- domain software...
42. System board- is the main circuit board of the system unit.
GPU
motherboard
dialog box
unauthorized access
43. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
POST
Denial of Service attack
Latency
DRAM
44. Read only memory refers to memory chips storing permanent data and instructions (firmware)
image processing
plug- in
ROM
Linux
45. A small metal or plastic device that uses pressure instead of ink.
certificate authority
software suite
compromised computer
stylus
46. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
Firewall
utility program
mashup
integrated circuit
47. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
expansion slot
Linux
Bluetooth
transistor
48. (laptop computer) portable personal computer often able to fit in your lap
System Unit
virus
DTP
Notebook Computer
49. Privately owned and limited to a specific vendor or computer model.
proprietary software...
hypermedia
E- commerce
macros
50. Is an online area in which isers have wrtten discussions about a particular subject.
newsgroup
unauthorized access
CAPTCHA
digital