SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
Application software...
air mouse
heat pipe
communications
2. Smaller than heat sink cools processors in notebook comps
solid state media
unethical employees
terminal
heat pipe
3. ...
DIMM
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
PIM
LAN
4. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
audit trail
macros
RFID
Motherboard
5. The fastest most powerful computer
Desktop Computer
supercomputer
embedded operating system
MAN
6. Consists of electronic components that store instructions waiting to be executed (On motherboard)
Application software...
dot matrix printer
Memory
stored program concept
7. A legal agreement that permits users to install the software on multiple computers.
site license
undervoltage
multifunction peripheral
bugs
8. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
IM
hot plugging
USB hub
SIMM
9. Combines several GIF images ina single GIF file.
sleep mode
botnets
animated Gif...
coaxial cable
10. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
bus
network standard
biometrics
heat pipe
11. A collection of computers and devices connected together - via communications devices and transmissions media.
network
system software...
hacker
program
12. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
token ring
WAN
POP3
ROM
13. Screen savors were made to prevent this - which etched images permanently onto the screen
Memory
WAN
Input
ghosting
14. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
MRAM
jewel box
embedded computer
MICR
15. Does not require a newsreader - easier to use than a newsgroup
message board
spoofing
proprietary software...
peripheral
16. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
bit
twisted pair cable
hibernate
adware
17. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
DTP
density
fiber optic cable
OSP
18. Someone who uses internet to destroy or damage computers for political reasons.
plaintext
parallel processing
cyberterrorist
data collection device
19. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
chat client
CMOS
802.11
script kiddie
20. Program that euns only on a specific type or make of computer
TLS
device dependant
Domain name system
CPU
21. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
system software...
bus
digital certificate
Firewall
22. Latest version of Post office Protocol
rootkit
Netiquette
POP3
network license
23. Case of the system unit to protect internal damage
pointing stick
chasis...
fault tolerant computer
Top level domain
24. Data that has been processed in a useful form- text - graphics - audio - video
embedded computer
Web conference
Output
pixel
25. Moving pictures experts group is a popular video compression standard
volatile memory
virus
access time
mpeg
26. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
peer to peer network
worm
MAN
streaming
27. A collection of data organized in a manner that allows access retrieval and use of that data
OSP
noise
POST
database
28. The original article and all subsequent related replies
Storage Device
thread
broadband
Web Application
29. A number that uniquely identifies each computer or device connected to the internet (0-255)
Mobile Computer
IP address
supercomputer
online security service
30. May break in to computer to exploit security weakness. financial gains - revenge.
transistor
unethical employees
POST
system clock
31. Saves any open documents and programs to RAM and places computer into a low power state
heat sink
Memory Cache
jewel box
sleep mode
32. The use of computer or network with out permission
EULA
MRAM
unauthorized access
hard disk
33. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
sending device
heat sink
cold boot
expansion bus
34. A vulnerable computer that is set up to entice an intruder to break into it.
adware
DLP projector
honeypot
data collection device
35. Each computer or device on the network. often connected by cables
node
compromised computer
optical disc
spyware
36. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
EULA
coaxial cable
system on a chip
web filter
37. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
address
pointing stick
superscalar
Memory Cache
38. Privately owned and limited to a specific vendor or computer model.
system unit
communications
proprietary software...
chat client
39. Reorganizing it so that the files are store in continous sectors
OCR
BIOS
power supply
defragmenting
40. Dynamic ram- chips must be re energized constantly or they lose their contents.
chat client
tactile output
SIMM
DRAM
41. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
cloud storage
Notebook Computer
VR
network architecture
42. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
System Software...
bus width
disk fragmenter
CPU
43. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
Intrusion detection software...
terminal
mpeg
power supply
44. A cable forms a closed loop with all computers. one direction
BIOS
document management software...
ring network
E- commerce
45. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
capacity
twisted pair cable
scanner
optical mouse
46. Digital light processor uses tiny mirrors to reflect light
unethical employees
crimeware
DLP projector
Mobile Device
47. Allows a user to plan schedule and track costs of a project
server
EFT
router
project management software...
48. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
spoofing
Noise
DVI
RTLS
49. Is a security measure that defines who can access it and what actions they can take while acessing the computer
Web Server
SRAM
Communications device
access control
50. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
utility program
digital
EULA
OMR