SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Is an online area in which isers have wrtten discussions about a particular subject.
communications channel
dot matrix printer
proprietary software...
newsgroup
2. Contains 10 or fewer comps - with similar reponsibilities and capabilities
peer to peer network
traffic
Motherboard
Mobile Computer
3. A real time internet communications service where you can talk to people online.
IM
capacity
firmware...
TCP/IP
4. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
botnets
CMOS
embedded computer
chip
5. ...
Domain name
client/server
L2 cache
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
6. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
Software...
network standard
EDI
noise
7. Graphical User interface - interact with software using text - graphics - and icons
MICR
microbrowser
TCP/IP
GUI
8. Software used by criminals
worm
crimeware
ciphertext
Input
9. They can execute more than one instruction per clock cycle
superscalar
access time
plug- in
freeware...
10. Other computers and mobile devices on the networ that rely on the server for its resources
plug- in
access control
peer to peer network
client
11. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
spyware
GUI
LAN
jack
12. The use of computer or network with out permission
turnaround document
unauthorized access
mpeg
chat client
13. Electrical supply drops.can cause data loss but generally not cause equipment damage
Noise
undervoltage
machine cycle
MICR
14. A communications device that enables a computer or device that does not have a built in networking capability to access a network
DLP projector
network card
document management software...
overvoltage
15. Broadband modem- sends and recives digital data over the cable television
cable modem
pixel
cyberextortionist
compromised computer
16. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
utility program
MICR
client/server
broadband internet service
17. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
IM
access control
DSL
thread
18. Text version of an IP address
pixel
Domain name
web filter
system unit
19. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
heat pipe
NAS
sending device
thread
20. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
script kiddie
broadband
software suite
VAN
21. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
memory module
Fiber to the Premises
Latency
Transmission media
22. They consist entirely of electronic components and contain no moving parts.
VAN
driver
nonvolatile memory
solid state media
23. Personal information manager is application software that includes features to help users organize personal info
PIM
Information system
port
parallel processing
24. When turning on a computer that has been turned off completly
CU
keygen
cold boot
corporate spies
25. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
SMTP
Processor
turnaround document
register
26. Computer automatically can configure adapter cards and other peripherals as you install them
system software...
address
Plug and Play
spider
27. A type of always on connection that is established between two communications devices. better than dial up line
Dedicated line
groupware...
Information system
expansion slot
28. Copyrighted software that is distributed at no cost for a trial period
wireless access point
shareware...
device dependant
TCP/IP
29. Digital light processor uses tiny mirrors to reflect light
DLP projector
program
client/server
image processing
30. A server that you connect to to start a chat session.
terminal
L1 cache
chat client
defragmenting
31. A temporary connection that uses one or more analog telphone lines for communications.
Dial Up line
network
heat sink
cross - platform
32. Short for key generator creats software registration numbers and sometimes activation codes.
CAD
coaxial cable
memory slots
keygen
33. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
access time
VR world
crimeware
fixed wireless
34. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
DSL
Point of Sale terminals
virtual provate network
fault tolerant computer
35. Single inline memory module forms a single set of contacts
analog
stylus
RTLS
SIMM
36. A know specific pattern of virus code.
access time
virus
newsgroup
virus signature
37. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
unauthorized access
Desktop Computer
Linux
macros
38. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
undervoltage
Web Application
Dial Up line
VR
39. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
transistor
expansion bus
virus
SRAM
40. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
jewel box
Communications device
driver
drive bay
41. Serves as the interface between the user - the app software - and the computers hardware
system software...
Memory Cache
neural network
client/server
42. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
spyware
network architecture
Desktop Computer
MMS
43. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
broadband internet service
Fiber to the Premises
RAID
ARPA
44. On software is infinitie space and depth for VR
sleep mode
TCP/IP
VR world
pointing stick
45. Local area network- network tat connects computers and devices in a limited geographical area such as a home
LAN
embedded computer
twisted pair cable
device dependant
46. Builds and maintains lists of words found on websites. Useful for search engines
spider
touchpad
jack
power supply
47. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
online security service
nonvolatile memory
hot spot
EULA
48. Case of the system unit to protect internal damage
plaintext
TLS
Internet Backbone
chasis...
49. 8 bits grouped together. basic storage unit in memory. Each byte has an address
byte
GUI
gender changer
undervoltage
50. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
File compression utility
heat pipe
VAN
spoofing
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests