SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses devices that emit and sense light to detect the mouses movement
wireless access point
CMOS
hypermedia
optical mouse
2. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
adware
pixel
memory module
VAN
3. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
Denial of Service attack
proprietary software...
DRAM
CU
4. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
buffer
jack
Bluetooth
WAN
5. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
L2 cache
cross - platform
hibernate
spooling
6. Initiates an instruction to transmit data - instructions - or information.
sending device
capacity
VR
newsreader
7. Power on self test to check the various system components and the results are compared with data in a CMOS chip
wireless Internet service provider
system on a chip
POST
BIOS
8. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
Storage Device
IrDA Port
analog
access time
9. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
document management software...
neural network
VR world
spyware
10. Moving pictures experts group is a popular video compression standard
Servers
star network
W3C
mpeg
11. Can be peropheral or chip - creates sound from digital instructions.
bugs
volatile memory
connector
synthesizer
12. A collection of computers and devices connected together - via communications devices and transmissions media.
network
optical disc
Noise
trackball
13. Consumer consumer e commerce.
online auction
digital forensics
E- commerce
device independent
14. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
wireless modem
protocol
supercomputer
Processor
15. Personal information manager is application software that includes features to help users organize personal info
Software...
PIM
access time
hard disk
16. Accepts the transmission of data - instructions - or info
recieving device
Drive Bay
optical reader
disk fragmenter
17. Read only memory refers to memory chips storing permanent data and instructions (firmware)
Firewall
proprietary software...
ROM
Plug and Play
18. Software used by criminals
System Unit
crimeware
E- retail
hypertext
19. Storage over an internet service
Mobile Computer
downloading
cloud storage
MICR
20. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
broadband
broadband internet service
application software...
Processor
21. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
disk fragmenter
device independent
Bluetooth
back door
22. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
overvoltage
ROM
Memory Cache
Notebook Computer
23. A legal agreement that permits users to install the software on multiple computers.
analog
data collection device
site license
hacker
24. Retains existing application software and data files even if you can change computer models or vendors
device independent
Web Browser
ASCII
database
25. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
Mobile Device
utility program
hard disk
newsgroup
26. Unencrypted readable data
OCR
Web Server
plaintext
virtual provate network
27. Two main parts are processor and memory.
Trojan Horse
Motherboard
Input
IP address
28. Used to gain competitive advantage
Desktop Computer
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
corporate spies
Dedicated line
29. Consists of electronic components that store instructions waiting to be executed (On motherboard)
Web conference
Memory
jack
hibernate
30. Two or more computers transfer data - instructions - and information.
crimeware
back door
communications
Input
31. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
UNIX
fixed wireless
Content Aggregator
Web Server
32. The standard that outlines characteristics of how two network devices communicate
spyware
EULA
Communications device
protocol
33. Pressure sensitive eraser shaped pointing device
pointing stick
expansion bus
undervoltage
firmware...
34. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
bus
NAS
stylus
DVI
35. The design of computers - devices - and media in the network
fiber optic cable
bus network
Software...
network architecture
36. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
volatile memory
document management software...
terminal
chat client
37. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
Drive Bay
client/server
heat sink
OSP
38. Records in a file both successful and unsuccessful attempts.
broadband internet service
jack
coaxial cable
audit trail
39. Perpetrator attempts to obtain your personal or financial info.
phishing
Desktop Computer
hot plugging
Output
40. Provide Wi Fi to mobile computers or devices
stored program concept
Hot spots
mpeg
multifunction peripheral
41. Single inline memory module forms a single set of contacts
PNG
MAN
SIMM
Mobile Computer
42. A real time internet communications service where you can talk to people online.
IM
wireless access point
spider
Dedicated line
43. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
hacker
cable modem
Content Aggregator
cyberextortionist
44. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
expansion slot
ROM
download
overvoltage
45. A type of system software that allows users to perform maintenence type tasks
utility program
Application software...
project management software...
TCP/IP
46. Provids mobile users with a secure connection to the company server as if the user has a private line.
compromised computer
virtual provate network
USB hub
DSL modem
47. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
Personal Computers
hot plugging
business software...
DSL
48. The process if a computer or device recieveing info info from the server on the internet
Dedicated line
jack
network topology
downloading
49. A document that you return to the company that creates and sends it.
warm boot
program
turnaround document
Home user
50. Any unwanted signal usually varying quickly
disk fragmenter
player
Personal Computers
Noise