SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A communications device that sends and recieves data and info to and from digital line
registrar
CU
digital modem
Intrusion detection software...
2. The process if a computer or device recieveing info info from the server on the internet
integrated circuit
downloading
Top level domain
hard disk
3. A device that enables you to join a port and a connector that are both male or female
density
mpeg
gender changer
ISP
4. Computer aided design software assists a professional user in creating designs
database
online auction
terminal
CAD
5. May break in to computer to exploit security weakness. financial gains - revenge.
unethical employees
Dedicated line
embedded operating system
USB hub
6. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
back door
hot plugging
W3C
device dependant
7. A communications device that enables a computer or device that does not have a built in networking capability to access a network
warm boot
network card
token ring
Latency
8. 8 bits grouped together. basic storage unit in memory. Each byte has an address
MRAM
byte
OMR
system bus
9. Short for key generator creats software registration numbers and sometimes activation codes.
analog
bugs
ASCII
keygen
10. A colection of individual programs available together as a unit. lower cost and ease of use
software suite
GPU
bus network
buffer
11. Most computers (on and off)
buffer
digital
kernal
VoIP
12. A system that attempts to imitate the behavior of a human brain.
neural network
cloud storage
telesurgery
token ring
13. A vulnerable computer that is set up to entice an intruder to break into it.
honeypot
http
optical disc
bus
14. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
application software...
cluster
802.11
optical reader
15. System board- is the main circuit board of the system unit.
motherboard
wordwrap
EULA
optical mouse
16. Universal serial bus port connects peripherals to the computer
USB port
client
pipelining
Application software...
17. A type of storage media that consists of flat disc and is written and read by a laser
System Unit
optical disc
connector
NAS
18. Hypertext transfer protocol
gender changer
Web conference
http
botnets
19. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
utility program
ciphertext
coaxial cable
overvoltage
20. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
hard disk
streaming cam
multifunction peripheral
VR
21. A rectangular opeining that typically holds disk drives.
online security service
Drive Bay
spider
VR
22. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
ALU
hot spot
business software...
memory module
23. Determines the number of bits that can be transmitted at one time
bus width
fault tolerant computer
RTLS
CAPTCHA
24. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
Fiber to the Premises
Intrusion detection software...
Software...
cold boot
25. They consist entirely of electronic components and contain no moving parts.
Web conference
solid state media
optical disc
utility programs
26. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
heat sink
freeware...
peer to peer network
Bluetooth
27. Health care professions conduct live conferences on the computer
Desktop Computer
machine cycle
FireWire port
telemedicine
28. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
machine cycle
Firewall
hash
network card
29. When turning on a computer that has been turned off completly
liquid flow technology
cold boot
Point of Sale terminals
TLS
30. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
registrar
E- commerce
Bay
spoofing
31. Allows the processor to communicate with peripherals.
ring network
e- learning
expansion bus
newsgroup
32. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
RAM
CMOS
Operating system
terminal
33. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
EDI
public- domain software...
spoofing
peripheral
34. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
Domain name system
Storage Media
product activation
DIMM
35. Power on self test to check the various system components and the results are compared with data in a CMOS chip
digital certificate
video card
sending device
POST
36. A number that uniquely identifies each computer or device connected to the internet (0-255)
DSL modem
IP address
virtual provate network
Latency
37. Dish shaped antenna for internet connection
network topology
noise
fixed wireless
recieving device
38. A program that restricts access to certain material on the web
web filter
cyberextortionist
product activation
supercomputer
39. The process of dividing the disk into tracks and sectors
System Software...
tactile output
bus
formatting
40. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
Latency
DTP
network standard
Transmission media
41. On software is infinitie space and depth for VR
IM
online security service
VR world
motherboard
42. Smallest element in an electronic image
machine cycle
star network
pixel
network standard
43. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
virtual provate network
W3C
solid state media
preemptive multitasking
44. Special software to listen to audio
player
SIMM
Web Server
FireWire port
45. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
peripheral
ASCII
ISP
Memory
46. Privately owned and limited to a specific vendor or computer model.
business software...
Web Server
System Unit
proprietary software...
47. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
freeware...
Servers
hypertext
proxy server
48. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
dot matrix printer
dialog box
Latency
spoofing
49. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
Content Aggregator
cyberterrorist
spooling
MMS
50. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
unethical employees
phishing
mpeg
DTP