SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The role of memory to store both data and programs
fixed wireless
CU
stored program concept
jack
2. A small metal or plastic device that uses pressure instead of ink.
cable modem
stylus
scanner
database
3. Provids mobile users with a secure connection to the company server as if the user has a private line.
virtual provate network
CAM
access time
hash
4. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
Mainframe
optical mouse
wireless access point
broadband internet service
5. Searches for and removes unneccessary files
GUI
wireless Internet service provider
disk cleanup
node
6. Picure messaging can occur from mobile to mobile and mobile to email
MMS
utility program
compromised computer
Memory
7. Controls timing of all computer operations
ROM
rootkit
adware
system clock
8. A number that uniquely identifies each computer or device connected to the internet (0-255)
IP address
FireWire port
EDI
Operating system
9. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
Mobile Computer
RIMM
trackball
CAD
10. Copyrighted software that is distributed at no cost for a trial period
System Software...
shareware...
CERT/CC
MAN
11. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
DSL modem
heat sink
bus
honeypot
12. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
hot spot
Processor
Bay
RAID
13. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
capacity
system software...
multifunction peripheral
Web Browser
14. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
network card
disk controller
pointing stick
warm boot
15. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
player
EDI
stored program concept
cluster
16. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
CPU
Plug and Play
IM
client/server
17. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
network
system unit
product activation
EFT
18. 8 bits grouped together. basic storage unit in memory. Each byte has an address
recieving device
trackball
byte
cloud storage
19. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
telemedicine
optical reader
jewel box
system unit
20. A case that contains electronic components of the computer used to process data.
image processing
system unit
player
ISP
21. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
Home user
memory slots
bus network
System Unit
22. Anopening inside the system unit in which you can install additional equipment. Different than a slot
Bay
video card
disk controller
VAN
23. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
Netbook
warm boot
Denial of Service attack
Operating system
24. Latest version of Post office Protocol
solid state media
POP3
disk fragmenter
access time
25. Most computers (on and off)
player
bus width
E- commerce
digital
26. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
ARPA
Content Aggregator
parallel processing
ROM
27. The number of bytes a storage medium can hold
capacity
Web Server
solid state drive
database
28. Can connect multiple types of devices that require faster data transmission speeds.
adapter card
FireWire port
Dial Up line
e- learning
29. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
wireless Internet service provider
port
DNS Server
ring network
30. Any unwanted signal usually varying quickly
Noise
sound card
POST
RFID
31. A legal agreement that permits users to install the software on multiple computers.
adware
device independent
Linux
site license
32. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
Storage Device
macros
public- domain software...
GPU
33. A program that restricts access to certain material on the web
cluster
overvoltage
Memory Cache
web filter
34. Dish shaped antenna for internet connection
program
fixed wireless
defragmenting
driver
35. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
device dependant
disk controller
tactile output
RIMM
36. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
dot matrix printer
E- retail
communications channel
streaming
37. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
Netbook
keygen
spooling
business software...
38. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
certificate authority
UNIX
cracker
project management software...
39. Records in a file both successful and unsuccessful attempts.
audit trail
optical disc
Processor
ergonomics
40. Obtains data directly at the location where the transaction or event takes place.
Internet Backbone
data collection device
Information system
unethical employees
41. A temporary connection that uses one or more analog telphone lines for communications.
Dial Up line
machine cycle
VAN
disk cleanup
42. When turning on a computer that has been turned off completly
product activation
Operating system
address
cold boot
43. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
cyberterrorist
power supply
ethernet
EULA
44. Small capacity built directly in the processor chip
Input
Application software...
L1 cache
embedded operating system
45. A small flat rectangular pointing device that is sensitive to pressure and motion.
disk fragmenter
touchpad
buffer
disk controller
46. Single inline memory module forms a single set of contacts
SIMM
trackball
GPU
http
47. The process if a computer or device recieveing info info from the server on the internet
downloading
star network
mashup
SMTP
48. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
spooling
RAID
program
MICR
49. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
terminal
SMTP
Bay
pixel
50. Screen savors were made to prevent this - which etched images permanently onto the screen
network
ghosting
message board
SRAM