SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Instead of port - jack is used to identify audio or video ports.
system unit
star network
system software...
jack
2. A type of storage media that consists of flat disc and is written and read by a laser
Bluetooth
plug- in
optical disc
port
3. The smallest unit of disk space that stores data and info
cluster
streaming
touchpad
streaming cam
4. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
adware
Web Browser
router
phishing
5. The fastest most powerful computer
noise
coaxial cable
hash
supercomputer
6. Is an online area in which isers have wrtten discussions about a particular subject.
newsgroup
cluster
access time
platter
7. Moving pictures experts group is a popular video compression standard
NAS
TLS
mpeg
wireless access point
8. Screen savors were made to prevent this - which etched images permanently onto the screen
Servers
site license
ghosting
OSP
9. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
dot matrix printer
Output
ergonomics
unauthorized access
10. Smallest unit of data the computer can process
web filter
bit
NAS
Application software...
11. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
EULA
disk controller
spider
script kiddie
12. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
platter
video card
fault tolerant computer
DIMM
13. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
macros
TLS
IM
adapter cards
14. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
W3C
WAN
online security service
phishing
15. Extends the capabilites of a browser.
Fiber to the Premises
network topology
thread
plug- in
16. Used to track and identify the location of high risk or high value items.
RTLS
proxy server
formatting
phishing
17. Health care professions conduct live conferences on the computer
database
DLP projector
embedded computer
telemedicine
18. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
EFT
microbrowser
network
Application software...
19. Does not require a newsreader - easier to use than a newsgroup
bus network
client/server
device independent
message board
20. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
broadband
Firewall
RTLS
VAN
21. Links in text based documents
Drive Bay
telesurgery
DSL
hypertext
22. An instruction that causes a program to perform a specific action.
business software...
cracker
commands
NAS
23. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
Noise
cold boot
script kiddie
VAN
24. On the motherboard hold memory modules
multi- core processor
hibernate
Content Aggregator
memory slots
25. May break in to computer to exploit security weakness. financial gains - revenge.
digital
unethical employees
hacker
stored program concept
26. Saves any open documents and programs to RAM and places computer into a low power state
RFID
sleep mode
utility program
Dial- up access
27. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
wireless Internet service provider
Storage Media
solid state drive
analog
28. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
access time
POST
wireless modem
wireless Internet service provider
29. Program is one that runs the same on multiple operating systems
trackball
cross - platform
SRAM
pretty good Privacy
30. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
system bus
W3C
BIOS
TLS
31. Latest version of Post office Protocol
spyware
POP3
embedded computer
server
32. A web application that combines services from two or more sources creating a new application.
mashup
Bay
web filter
POST
33. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
virtual provate network
preemptive multitasking
router
warm boot
34. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
WAN
Laser printer
CAM
nonvolatile memory
35. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
node
DIMM
wireless modem
OSP
36. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
message board
connector
Mainframe
virtual provate network
37. Obtains data directly at the location where the transaction or event takes place.
jewel box
data collection device
Intrusion detection software...
machine cycle
38. Saves any open docs or programs to hardisk before removing power
hibernate
bandwidth
ALU
Domain name
39. Protective case for optical discs
animated Gif...
recieving device
disk controller
jewel box
40. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
RFID
optical disc
RSS 2.0
access time
41. Copyrighted software that is distributed at no cost for a trial period
spooling
Domain name system
shareware...
L1 cache
42. Graphic file (JPEG - GIF) slowly replacing GIF
PNG
nonvolatile memory
wireless modem
Operating system
43. Program that euns only on a specific type or make of computer
L2 cache
device dependant
machine cycle
optical mouse
44. Determines the number of bits that can be transmitted at one time
telesurgery
bus width
IM
fiber optic cable
45. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
platter
network topology
warm boot
registrar
46. A part of the motherboard and connects the processor to main memory
system clock
data collection device
system bus
Transmission media
47. Started the internet as a networking project
ARPA
virus signature
drive bay
adapter card
48. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
cable modem
power supply
hypertext
fixed wireless
49. Software used by criminals
communications channel
download
utility program
crimeware
50. When online meetings take place on the web
MRAM
digital signature
PNG
Web conference