SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The technology of authenticating a persons identity by verifying a personal characteristic.
CU
L1 cache
biometrics
token ring
2. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
Top level domain
client
warm boot
firmware...
3. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
connector
TLS
memory module
Netiquette
4. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
application software...
Denial of Service attack
Firewall
EDI
5. Protective case for optical discs
broadband internet service
jewel box
superscalar
parallel processing
6. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
Storage Device
Firewall
mpeg
router
7. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
script kiddie
Storage Media
firmware...
sound card
8. Contains 10 or fewer comps - with similar reponsibilities and capabilities
thread
peer to peer network
Top level domain
twisted pair cable
9. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
File compression utility
POST
project management software...
Operating system
10. Extends the capabilites of a browser.
plug- in
fault tolerant computer
product activation
MRAM
11. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
Mainframe
business software...
OSP
turnaround document
12. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
fiber optic cable
CMOS
protocol
platter
13. The design of computers - devices - and media in the network
E- commerce
Web Server
network architecture
virtual provate network
14. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
integrated circuit
ASCII
Internet Backbone
fixed wireless
15. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
network architecture
Memory Cache
optical disc
multi- core processor
16. Reorganizing it so that the files are store in continous sectors
IM
defragmenting
driver
fiber optic cable
17. Instead of port - jack is used to identify audio or video ports.
chasis...
jack
gender changer
utility programs
18. Two main parts are processor and memory.
digital
UNIX
DVI
Motherboard
19. Digital light processor uses tiny mirrors to reflect light
GUI
ALU
touchpad
DLP projector
20. Dish shaped antenna for internet connection
coaxial cable
sending device
fixed wireless
Latency
21. A case that contains electronic components of the computer used to process data.
access control
Storage Media
system unit
downloading
22. A small flat rectangular pointing device that is sensitive to pressure and motion.
Memory
bugs
touchpad
access control
23. The number of bits in an area on a storage medium - Higher density means more storage capacity
density
sleep mode
mpeg
video card
24. Sends digital data and info from a comp to a DSL line
script kiddie
certificate authority
DSL modem
capacity
25. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
network topology
peripheral
PNG
wireless access point
26. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
hard disk
access time
keygen
network
27. Processor begins to fetch a second instruction before it completes the full machine cycle
drive bay
heat pipe
pipelining
coaxial cable
28. A communications device that enables a computer or device that does not have a built in networking capability to access a network
Dial up modems
Firewall
preemptive multitasking
network card
29. Electrical supply drops.can cause data loss but generally not cause equipment damage
undervoltage
system unit
peripheral
ring network
30. Allows the processor to communicate with peripherals.
Dedicated line
token ring
digital modem
expansion bus
31. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
expansion slot
Transmission media
download
RIMM
32. A legal agreement that permits users to install the software on multiple computers.
site license
memory module
File compression utility
online auction
33. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
Storage Media
Firewall
power supply
drive bay
34. The use of computer or network with out permission
Processor
unauthorized access
commands
audit trail
35. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
preemptive multitasking
fiber optic cable
player
wireless access point
36. Is an online area in which isers have wrtten discussions about a particular subject.
supercomputer
Output
newsgroup
preemptive multitasking
37. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
network card
mpeg
POP3
virus
38. Special software to listen to audio
cyberterrorist
player
cluster
ROM
39. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
RFID
sleep mode
back door
chip
40. Online service provider- has many members features along with internet access such as IM or Web browsers.
FireWire port
plaintext
OSP
registrar
41. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
CMOS
Noise
Storage Media
Memory Cache
42. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
router
device independent
RAM
tactile output
43. Communications activity. Handled by NSFnet.
traffic
wordwrap
system clock
access control
44. Uses radio waves to transmit data between two devices.
Bluetooth
buffer
hacker
Plug and Play
45. When turning on a computer that has been turned off completly
SIMM
access time
microbrowser
cold boot
46. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
TCP/IP
product activation
star network
CMOS
47. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
system unit
trackball
Personal Computers
buffer
48. A family member on a computer
BIOS
document management software...
Home user
hacker
49. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
formatting
RFID
broadband internet service
bus network
50. A rectangular opeining that typically holds disk drives.
token ring
access control
volatile memory
Drive Bay