SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Transmission media on which the data - instructions - information travel.
expansion slot
communications channel
dot matrix printer
network card
2. Two main parts are processor and memory.
adapter card
spyware
Motherboard
system clock
3. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
chip
volatile memory
cracker
DSL
4. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
kernal
peripheral
wireless access point
Netbook
5. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
Terminal
BIOS
digital certificate
RFID
6. Used to gain competitive advantage
corporate spies
hot plugging
telemedicine
dialog box
7. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
Bluetooth
CU
stored program concept
corporate spies
8. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
EDI
embedded operating system
video card
Web Browser
9. Is a security measure that defines who can access it and what actions they can take while acessing the computer
802.11
multi- core processor
access control
MAN
10. Provids mobile users with a secure connection to the company server as if the user has a private line.
wireless access point
virtual provate network
RIMM
stored program concept
11. Allows a user to plan schedule and track costs of a project
CAPTCHA
coaxial cable
project management software...
E- retail
12. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
IM
liquid flow technology
dialog box
DTP
13. zombie
CU
hibernate
compromised computer
network card
14. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
device dependant
peer to peer network
disk controller
preemptive multitasking
15. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
SMTP
fault tolerant computer
hypertext
botnets
16. A type of always on connection that is established between two communications devices. better than dial up line
Dedicated line
synthesizer
fault tolerant computer
TLS
17. Protective case for optical discs
registrar
jewel box
turnaround document
Processor
18. An instruction that causes a program to perform a specific action.
commands
heat pipe
peer to peer network
Memory
19. Single chip with two or more processor cores.
gender changer
multi- core processor
system software...
freeware...
20. Storage over an internet service
cloud storage
network
SRAM
Terminal
21. Software used by criminals
Servers
mpeg
hacker
crimeware
22. Screen savors were made to prevent this - which etched images permanently onto the screen
ghosting
server
heat pipe
telesurgery
23. Method that the internet uses to store domain names and their corressponding IP addresses
DVI
Domain name system
W3C
motherboard
24. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
nonvolatile memory
wireless Internet service provider
bus
star network
25. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
Software...
port
optical mouse
liquid flow technology
26. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
Storage Media
optical disc
Dial- up access
MAN
27. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
DSL
digital forensics
script kiddie
Web Browser
28. When online meetings take place on the web
Output
newsgroup
Web conference
system unit
29. Provides the user with a physcial response from the device
register
IrDA Port
Hot spots
tactile output
30. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
bandwidth
NAS
database
terminal
31. Hides within or looks like a legitimate program such as a screen saver
backside bus
system unit
network license
Trojan Horse
32. Any unwanted signal usually varying quickly
OSP
MMS
EFT
Noise
33. The delivery of education via some electronic method such as the internet - networks - or optical disks.
digital
cyberextortionist
e- learning
System Unit
34. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
capacity
proxy server
adapter cards
802.11
35. Privately owned and limited to a specific vendor or computer model.
Transmission media
Noise
MMS
proprietary software...
36. A type of system software that allows users to perform maintenence type tasks
utility program
broadband
digital modem
compromised computer
37. A rectangular opeining that typically holds disk drives.
CPU
Web Browser
Drive Bay
undervoltage
38. The process of dividing the disk into tracks and sectors
e- learning
formatting
synthesizer
Transmission media
39. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
disk fragmenter
Denial of Service attack
ASCII
star network
40. Acts as an electronic switch that opens or closes the circuit for electrical charges
transistor
shareware...
hard disk
Drive Bay
41. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
firmware...
Transmission media
memory slots
hot plugging
42. Uses devices that emit and sense light to detect the mouses movement
POST
L2 cache
optical mouse
Motherboard
43. Smaller than heat sink cools processors in notebook comps
macros
Operating system
node
heat pipe
44. Combines several GIF images ina single GIF file.
animated Gif...
sending device
power supply
ring network
45. Most computers (on and off)
digital
dot matrix printer
microbrowser
TCP/IP
46. Dish shaped antenna for internet connection
disk fragmenter
utility programs
fixed wireless
plug- in
47. Copyrighted software that is distributed at no cost for a trial period
register
shareware...
site license
adware
48. Extends the capabilites of a browser.
embedded computer
chat client
plug- in
fixed wireless
49. A program that restricts access to certain material on the web
integrated circuit
drive bay
web filter
dot matrix printer
50. Small capacity built directly in the processor chip
ciphertext
certificate authority
L1 cache
embedded computer