SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A document that you return to the company that creates and sends it.
client/server
turnaround document
plaintext
SRAM
2. Encrypted data
ciphertext
File compression utility
Transmission media
biometrics
3. Fetching - decoding - executing - storing
warm boot
botnets
machine cycle
NAS
4. The number of bits in an area on a storage medium - Higher density means more storage capacity
certificate authority
botnets
project management software...
density
5. Dynamic ram- chips must be re energized constantly or they lose their contents.
E- retail
Drive Bay
DRAM
defragmenting
6. Uses radio waves to transmit data between two devices.
Bluetooth
http
registrar
EDI
7. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
Domain name
RAID
data collection device
spooling
8. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
adapter card
ASCII
system software...
dot matrix printer
9. Media transmit multiple signals simutaneously. Download faster than upload
memory module
broadband
downloading
wordwrap
10. A small metal or plastic device that uses pressure instead of ink.
E- commerce
stylus
network
virus
11. Uses fiber optic cable for internet connection.
Trojan Horse
ciphertext
VAN
Fiber to the Premises
12. Is an online area in which isers have wrtten discussions about a particular subject.
hash
newsgroup
USB hub
disk controller
13. Moving pictures experts group is a popular video compression standard
utility program
mpeg
undervoltage
OSP
14. Optical mark recognition reads hand drawn marks such as circles or rectangles.
OMR
scanner
ARPA
wireless access point
15. On the motherboard hold memory modules
Home user
unethical employees
memory slots
UNIX
16. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
PNG
DSL modem
utility programs
backside bus
17. The last section of the domain name
Top level domain
Motherboard
neural network
system unit
18. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
spooling
formatting
Information system
peripheral
19. Computing device small enough to hold in your hand
bugs
application software...
Information system
Mobile Device
20. Health care professions conduct live conferences on the computer
byte
telemedicine
chat client
peripheral
21. Read only memory refers to memory chips storing permanent data and instructions (firmware)
virtual provate network
ROM
sound card
Personal Computers
22. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
downloading
streaming cam
nonvolatile memory
chat client
23. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
DNS Server
CMOS
power supply
LAN
24. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
ASCII
wireless access point
memory module
NAS
25. A socket in the motherboard that can hold an adapter card
system software...
supercomputer
unauthorized access
expansion slot
26. Provide Wi Fi to mobile computers or devices
Hot spots
peripheral
Bay
RIMM
27. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
Processor
heat pipe
worm
defragmenting
28. Local area network- network tat connects computers and devices in a limited geographical area such as a home
twisted pair cable
connector
LAN
optical reader
29. Cables - telephone lines - radio networks - satellites
Transmission media
hypermedia
Domain name system
Drive Bay
30. Dish shaped antenna for internet connection
fixed wireless
digital forensics
token ring
SMTP
31. Pressure sensitive eraser shaped pointing device
Linux
hard disk
dialog box
pointing stick
32. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
platter
utility programs
peer to peer network
Mobile Device
33. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
WAN
PIM
Web Server
noise
34. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
MRAM
network standard
bugs
pipelining
35. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
e- learning
token ring
digital forensics
Trojan Horse
36. Consists of electronic components that store instructions waiting to be executed (On motherboard)
warm boot
site license
Memory
CAM
37. The design of computers - devices - and media in the network
hypertext
rootkit
network architecture
chasis...
38. A cable forms a closed loop with all computers. one direction
ring network
jewel box
honeypot
solid state media
39. A program that hides in a computer and allows someone from a remote location to take control of the computer
wireless access point
air mouse
rootkit
byte
40. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
Memory
byte
streaming
buffer
41. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
online security service
Firewall
macros
Operating system
42. The process if a computer or device recieveing info info from the server on the internet
network topology
memory module
downloading
adapter card
43. A small flat rectangular pointing device that is sensitive to pressure and motion.
touchpad
register
jewel box
EDI
44. The delivery of education via some electronic method such as the internet - networks - or optical disks.
message board
virus signature
wireless modem
e- learning
45. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
ARPA
memory slots
kernal
VR world
46. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
image processing
pretty good Privacy
Personal Computers
memory module
47. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
utility program
Top level domain
virus
network standard
48. System board- is the main circuit board of the system unit.
Dial Up line
Domain name system
virus
motherboard
49. Can be peropheral or chip - creates sound from digital instructions.
synthesizer
GUI
RSS 2.0
audit trail
50. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
DSL
CPU
ARPA
optical disc