SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
File compression utility
CPU
ASCII
Internet Backbone
2. The technology of authenticating a persons identity by verifying a personal characteristic.
Personal Computers
cluster
biometrics
plaintext
3. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
streaming
ergonomics
Mobile Device
router
4. Sends digital data and info from a comp to a DSL line
biometrics
driver
Latency
DSL modem
5. Circuit boards tjay provide connections and functions not built into the motherboard
system unit
thread
adapter cards
memory module
6. A document that you return to the company that creates and sends it.
turnaround document
freeware...
expansion bus
expansion slot
7. The process of dividing the disk into tracks and sectors
formatting
jewel box
USB hub
corporate spies
8. A temporary connection that uses one or more analog telphone lines for communications.
crimeware
DIMM
Dial Up line
network
9. Perpetrator attempts to obtain your personal or financial info.
Information system
bit
phishing
embedded computer
10. Electrical supply drops.can cause data loss but generally not cause equipment damage
Input
multi- core processor
telemedicine
undervoltage
11. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
spooling
business software...
proxy server
memory module
12. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
spider
Firewall
cracker
Web Application
13. A type of system software that allows users to perform maintenence type tasks
dot matrix printer
utility program
certificate authority
system unit
14. A case that contains electronic components of the computer used to process data.
system unit
bus
cold boot
CMOS
15. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
motherboard
Trojan Horse
terminal
freeware...
16. Hardware - software - data - people - procedures
terminal
W3C
Information system
newsgroup
17. Single chip with two or more processor cores.
bugs
DSL modem
multi- core processor
NAS
18. Each computer or device on the network. often connected by cables
Input
DVI
node
registrar
19. The role of memory to store both data and programs
USB hub
e- learning
stored program concept
cluster
20. Special software to listen to audio
player
groupware...
Memory
PIM
21. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
SMTP
memory module
hacker
Web Browser
22. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
volatile memory
network
memory module
USB hub
23. Contain permanently writeen data - instructions - and information
cyberterrorist
telemedicine
firmware...
Top level domain
24. A web application that combines services from two or more sources creating a new application.
biometrics
utility program
mashup
USB hub
25. The fastest most powerful computer
W3C
newsgroup
supercomputer
stylus
26. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
data collection device
server
buffer
animated Gif...
27. Allows a user to plan schedule and track costs of a project
ciphertext
project management software...
warm boot
spoofing
28. The process if a computer or device recieveing info info from the server on the internet
downloading
cable modem
CU
freeware...
29. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
Point of Sale terminals
Web Browser
Desktop Computer
nonvolatile memory
30. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
USB port
Denial of Service attack
SRAM
hard disk
31. Copyrighted software that is distributed at no cost for a trial period
shareware...
payload
fiber optic cable
peer to peer network
32. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
product activation
network
back door
MAN
33. Extends the capabilites of a browser.
plug- in
OCR
phishing
system software...
34. zombie
formatting
traffic
OCR
compromised computer
35. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
Latency
solid state media
Netbook
USB hub
36. Optical mark recognition reads hand drawn marks such as circles or rectangles.
compromised computer
nonvolatile memory
Fiber to the Premises
OMR
37. An electrical disturbance that can degrade communications
Fiber to the Premises
noise
DSL
VoIP
38. Major carriers of network traffic
tactile output
RTLS
RAID
Internet Backbone
39. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
expansion slot
warm boot
system software...
cracker
40. Copyrighted software provided at no cost by company that retains all rights to software
RIMM
freeware...
chip
memory slots
41. Two or more computers transfer data - instructions - and information.
wordwrap
communications
heat pipe
Noise
42. Needed generally to participate in a newsgroup
cable modem
newsreader
motherboard
Denial of Service attack
43. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
spider
spyware
broadband internet service
Dial Up line
44. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
Storage Device
dialog box
stylus
digital signature
45. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
Memory Cache
player
optical reader
Servers
46. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
network topology
back door
liquid flow technology
crimeware
47. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
cloud storage
Operating system
plug- in
E- retail
48. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
solid state drive
port
cloud storage
adapter cards
49. A number that uniquely identifies each computer or device connected to the internet (0-255)
botnets
DIMM
digital signature
IP address
50. Saves any open docs or programs to hardisk before removing power
software suite
fault tolerant computer
hibernate
adapter card