SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Operating system on mobile devices that generally resides on ROM
document management software...
network standard
embedded operating system
system unit
2. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
client
Output
bus
scanner
3. Perpetrator attempts to obtain your personal or financial info.
mashup
Content Aggregator
Storage Device
phishing
4. A system that attempts to imitate the behavior of a human brain.
neural network
DIMM
ARPA
Dial- up access
5. A vulnerable computer that is set up to entice an intruder to break into it.
NAS
spooling
honeypot
CAPTCHA
6. Integrates the functions of a processor - memory and a video card on a single chip.
solid state media
system on a chip
optical disc
volatile memory
7. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
kernal
Mobile Computer
RSS 2.0
Web Server
8. Communications activity. Handled by NSFnet.
heat sink
cloud storage
traffic
hot plugging
9. Processor begins to fetch a second instruction before it completes the full machine cycle
cracker
Trojan Horse
backside bus
pipelining
10. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
synthesizer
RFID
corporate spies
twisted pair cable
11. The original article and all subsequent related replies
heat sink
thread
sending device
gender changer
12. Is a security measure that defines who can access it and what actions they can take while acessing the computer
expansion bus
access control
RFID
Trojan Horse
13. A small flat rectangular pointing device that is sensitive to pressure and motion.
ethernet
spyware
touchpad
Dial- up access
14. A family member on a computer
Home user
NAS
network standard
proprietary software...
15. Electrical supply drops.can cause data loss but generally not cause equipment damage
unethical employees
undervoltage
analog
802.11
16. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
disk fragmenter
Domain name
Dial up modems
Fiber to the Premises
17. Uses fiber optic cable for internet connection.
Memory
freeware...
phishing
Fiber to the Premises
18. Online service provider- has many members features along with internet access such as IM or Web browsers.
OSP
Bluetooth
memory module
online auction
19. Computing device small enough to hold in your hand
integrated circuit
dialog box
embedded operating system
Mobile Device
20. Protective case for optical discs
volatile memory
jewel box
cold boot
hypermedia
21. 8 bits grouped together. basic storage unit in memory. Each byte has an address
cloud storage
byte
bit
product activation
22. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
message board
virtual provate network
EDI
formatting
23. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
System Software...
Internet Backbone
CMOS
MAN
24. The code of acceptable behaviors users should follow while on the internet.
DSL
Dial Up line
Netiquette
tactile output
25. A set of programs that coordinates all of the activies among computer hardware devices.
Operating system
site license
ARPA
application software...
26. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
telesurgery
SMTP
CPU
spider
27. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
NAS
hypermedia
MMS
corporate spies
28. Internet teephony- enables users to speak to other users over the internet
RSS 2.0
Dial- up access
animated Gif...
VoIP
29. The standard that outlines characteristics of how two network devices communicate
network
protocol
Web Browser
bugs
30. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
client/server
product activation
ethernet
IM
31. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
peer to peer network
chat client
air mouse
server
32. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
density
network standard
download
CMOS
33. One or more computers on the network request services from the server. 10 or more computers
analog
Personal Computers
registrar
client/server
34. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
heat sink
PNG
L1 cache
overvoltage
35. The smallest unit of disk space that stores data and info
Trojan Horse
GUI
cluster
http
36. zombie
compromised computer
neural network
sound card
audit trail
37. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
Fiber to the Premises
buffer
Dial up modems
macros
38. Contain permanently writeen data - instructions - and information
player
digital certificate
firmware...
network card
39. Enahnces the sound generating capabilites of a personal computer
sound card
L2 cache
virtual provate network
Notebook Computer
40. Local area network- network tat connects computers and devices in a limited geographical area such as a home
LAN
thread
optical reader
MICR
41. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
streaming cam
Storage Device
wireless access point
DRAM
42. The technology of authenticating a persons identity by verifying a personal characteristic.
chat client
unauthorized access
RTLS
biometrics
43. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
hypertext
parallel processing
disk controller
SMTP
44. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
macros
hacker
EULA
DSL modem
45. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
device independent
hard disk
Application software...
worm
46. Uses radio waves to transmit data between two devices.
client/server
Bluetooth
download
mpeg
47. Software that helps groups of people work together on projects and share info over a network
groupware...
E- commerce
adapter card
embedded computer
48. The design of computers - devices - and media in the network
CPU
network architecture
hypermedia
system on a chip
49. Other computers and mobile devices on the networ that rely on the server for its resources
shareware...
hacker
RTLS
client
50. Errors that can be recognized by automatic update
data collection device
bugs
sleep mode
CPU