SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. All computers connected to central device. Hub or switch
expansion slot
star network
ciphertext
commands
2. Has the illusion of moving images becuase it sends a continuos stream of images
digital signature
plug- in
business software...
streaming cam
3. Provides the user with a physcial response from the device
Linux
hash
tactile output
digital forensics
4. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
bus
Domain name system
formatting
disk cleanup
5. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
defragmenting
Motherboard
BIOS
DNS Server
6. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
PIM
Storage Media
Bluetooth
Top level domain
7. Searches for and removes unneccessary files
disk cleanup
freeware...
VR world
SIMM
8. A temporary connection that uses one or more analog telphone lines for communications.
Firewall
Dial Up line
Dedicated line
memory module
9. A legal agreement that permits users to install the software on multiple computers.
embedded operating system
density
wireless access point
site license
10. Acts as an electronic switch that opens or closes the circuit for electrical charges
network license
undervoltage
image processing
transistor
11. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
ISP
adapter card
VAN
downloading
12. Read only memory refers to memory chips storing permanent data and instructions (firmware)
ROM
ASCII
Input
register
13. The fastest most powerful computer
online auction
DVI
gender changer
supercomputer
14. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
streaming cam
ASCII
trackball
Mainframe
15. Needed generally to participate in a newsgroup
VR world
newsreader
RTLS
Linux
16. Copyrighted software that is distributed at no cost for a trial period
Intrusion detection software...
shareware...
hibernate
Memory Cache
17. 8 bits grouped together. basic storage unit in memory. Each byte has an address
byte
VR
online security service
image processing
18. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
hot plugging
TLS
multi- core processor
image processing
19. Msot retail stores use POS to record purchases - process cards - and update inventory
network architecture
Point of Sale terminals
site license
EFT
20. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
pipelining
system on a chip
streaming
bugs
21. Uses radio waves to transmit data between two devices.
online security service
Bluetooth
supercomputer
buffer
22. A small flat rectangular pointing device that is sensitive to pressure and motion.
freeware...
synthesizer
RSS 2.0
touchpad
23. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
preemptive multitasking
mpeg
OSP
Linux
24. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
node
parallel processing
Memory
cyberextortionist
25. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
nonvolatile memory
FireWire port
business software...
network architecture
26. A window that provides info - presents availabe options - or requests a response.
Web Application
dialog box
player
volatile memory
27. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
disk cleanup
network standard
rootkit
coaxial cable
28. Provide Wi Fi to mobile computers or devices
client/server
shareware...
W3C
Hot spots
29. Graphical User interface - interact with software using text - graphics - and icons
GUI
ASCII
virus
Domain name system
30. Controls timing of all computer operations
telemedicine
motherboard
spooling
system clock
31. A system that attempts to imitate the behavior of a human brain.
SRAM
DNS Server
heat sink
neural network
32. Completely Automated Public Turing test to tell Computers and Humans Apart.
CAPTCHA
Web Server
client/server
MRAM
33. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
Drive Bay
video card
wordwrap
Storage Device
34. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
cracker
CERT/CC
coaxial cable
utility programs
35. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
DNS Server
proxy server
Firewall
supercomputer
36. Designed for mobile devices
disk cleanup
microbrowser
mpeg
SRAM
37. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
MMS
player
DVI
formatting
38. Hides within or looks like a legitimate program such as a screen saver
Trojan Horse
ALU
UNIX
ethernet
39. Is a security measure that defines who can access it and what actions they can take while acessing the computer
access control
parallel processing
bugs
freeware...
40. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
Processor
Dial up modems
fixed wireless
memory module
41. When turning on a computer that has been turned off completly
router
pixel
cold boot
buffer
42. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
animated Gif...
application software...
DSL
project management software...
43. Transmission media on which the data - instructions - information travel.
machine cycle
wireless Internet service provider
communications channel
ergonomics
44. The process of dividing the disk into tracks and sectors
system unit
formatting
drive bay
GPU
45. Sends digital data and info from a comp to a DSL line
hot plugging
DSL modem
kernal
LAN
46. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
RSS 2.0
register
terminal
47. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
system clock
peripheral
cluster
cracker
48. System board- is the main circuit board of the system unit.
Laser printer
motherboard
CPU
buffer
49. Moving pictures experts group is a popular video compression standard
gender changer
Netbook
mpeg
document management software...
50. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
gender changer
Processor
hard disk
CU