SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Program that euns only on a specific type or make of computer
system unit
streaming cam
CERT/CC
device dependant
2. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
device independent
bus
MRAM
ASCII
3. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
system software...
machine cycle
cable modem
spyware
4. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
botnets
Firewall
VR
DLP projector
5. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
Operating system
business software...
turnaround document
project management software...
6. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
power supply
memory module
utility program
disk controller
7. A window that provides info - presents availabe options - or requests a response.
supercomputer
MICR
dot matrix printer
dialog box
8. Allows users to keep typing without using enter at the end of each line
Trojan Horse
corporate spies
USB hub
wordwrap
9. Picure messaging can occur from mobile to mobile and mobile to email
CAM
terminal
MMS
spoofing
10. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
WAN
unauthorized access
CMOS
broadband
11. The fastest most powerful computer
L1 cache
data collection device
supercomputer
microbrowser
12. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
Intrusion detection software...
spooling
client/server
message board
13. Power on self test to check the various system components and the results are compared with data in a CMOS chip
POST
802.11
Application software...
hash
14. Hypertext transfer protocol
terminal
http
GPU
hot spot
15. The original article and all subsequent related replies
spider
thread
Bluetooth
driver
16. Provids mobile users with a secure connection to the company server as if the user has a private line.
DIMM
virtual provate network
connector
wireless Internet service provider
17. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
parallel processing
supercomputer
preemptive multitasking
POST
18. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
IP address
communications
application software...
liquid flow technology
19. A communications device that enables a computer or device that does not have a built in networking capability to access a network
script kiddie
L2 cache
cold boot
network card
20. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
register
trackball
RAID
adware
21. Graphics processing unit controls the manipulation and display of graphics on the display device.
Motherboard
GPU
database
memory module
22. A collection of data organized in a manner that allows access retrieval and use of that data
rootkit
video card
W3C
database
23. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
heat sink
Denial of Service attack
POP3
expansion bus
24. Computer aided design software assists a professional user in creating designs
adware
CAD
Operating system
defragmenting
25. Perpetrator attempts to obtain your personal or financial info.
thread
phishing
image processing
bus
26. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
Processor
project management software...
POST
Application software...
27. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
hash
L2 cache
IrDA Port
CU
28. A family member on a computer
bus
online security service
Home user
PIM
29. Cables - telephone lines - radio networks - satellites
coaxial cable
Transmission media
Operating system
scanner
30. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
DNS Server
Operating system
Web Application
disk fragmenter
31. Used to gain competitive advantage
E- retail
Mainframe
corporate spies
File compression utility
32. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
TCP/IP
cyberextortionist
Web conference
plaintext
33. When turning on a computer that has been turned off completly
crimeware
cold boot
hypertext
CAPTCHA
34. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
Web Application
FireWire port
CU
35. Does not require a newsreader - easier to use than a newsgroup
RFID
spyware
SMTP
message board
36. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
fiber optic cable
recieving device
chat client
CAM
37. Human speech is bc of its continous signal that vary in strength and quality
botnets
analog
Memory Cache
cyberextortionist
38. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
capacity
W3C
worm
Linux
39. Copyrighted software provided at no cost by company that retains all rights to software
business software...
freeware...
L1 cache
system bus
40. Latest version of Post office Protocol
utility program
pretty good Privacy
POP3
application software...
41. Errors that can be recognized by automatic update
ciphertext
bugs
unethical employees
data collection device
42. Electrical supply drops.can cause data loss but generally not cause equipment damage
CAPTCHA
DTP
jack
undervoltage
43. A web application that combines services from two or more sources creating a new application.
IP address
mashup
wireless modem
Laser printer
44. 8 bits grouped together. basic storage unit in memory. Each byte has an address
groupware...
Storage Device
byte
online security service
45. Saves any open documents and programs to RAM and places computer into a low power state
sleep mode
Memory
pretty good Privacy
CAM
46. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
hypermedia
system on a chip
traffic
L1 cache
47. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
CMOS
Content Aggregator
virus
scanner
48. Serves as the interface between the user - the app software - and the computers hardware
audit trail
liquid flow technology
Storage Device
system software...
49. Started the internet as a networking project
chasis...
Dial Up line
ARPA
ciphertext
50. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
adware
disk cleanup
e- learning
expansion bus