SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Graphical User interface - interact with software using text - graphics - and icons
EFT
GUI
capacity
stylus
2. Consumer consumer e commerce.
protocol
online auction
volatile memory
Operating system
3. Personal information manager is application software that includes features to help users organize personal info
compromised computer
SIMM
token ring
PIM
4. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
unethical employees
Information system
Dial- up access
SRAM
5. Software that helps groups of people work together on projects and share info over a network
network card
groupware...
unethical employees
memory slots
6. A type of system software that allows users to perform maintenence type tasks
BIOS
virtual provate network
virus signature
utility program
7. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
drive bay
Storage Media
POP3
twisted pair cable
8. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
peripheral
solid state media
Denial of Service attack
newsgroup
9. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
image processing
warm boot
MRAM
bus
10. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
capacity
Operating system
biometrics
product activation
11. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
nonvolatile memory
Personal Computers
Memory
overvoltage
12. The process of dividing the disk into tracks and sectors
PNG
superscalar
formatting
memory slots
13. A temporary connection that uses one or more analog telphone lines for communications.
traffic
Web Server
video card
Dial Up line
14. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
cyberextortionist
unethical employees
ethernet
overvoltage
15. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
virus
spider
TLS
ALU
16. Moving pictures experts group is a popular video compression standard
wireless Internet service provider
network license
mpeg
digital certificate
17. Records in a file both successful and unsuccessful attempts.
Plug and Play
node
bus
audit trail
18. Retains existing application software and data files even if you can change computer models or vendors
http
ciphertext
keygen
device independent
19. Transmits data via infared light waves.. Both computer and device must have the port for it to work
broadband internet service
SRAM
chip
IrDA Port
20. Two main parts are processor and memory.
ASCII
Netbook
shareware...
Motherboard
21. Internet connections using regular copper telephone lines.
network topology
DSL
Noise
DLP projector
22. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
newsreader
trackball
kernal
register
23. The code of acceptable behaviors users should follow while on the internet.
rootkit
script kiddie
broadband
Netiquette
24. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
corporate spies
supercomputer
Linux
bus width
25. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
business software...
jack
turnaround document
Processor
26. Hides within or looks like a legitimate program such as a screen saver
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
web filter
business software...
Trojan Horse
27. The process if a computer or device recieveing info info from the server on the internet
Communications device
downloading
optical mouse
broadband internet service
28. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
disk controller
transistor
preemptive multitasking
jewel box
29. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
fault tolerant computer
ALU
Desktop Computer
Dial- up access
30. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
expansion bus
multi- core processor
chasis...
access time
31. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
EULA
peripheral
access control
Intrusion detection software...
32. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
driver
Hot spots
Storage Media
liquid flow technology
33. Major carriers of network traffic
payload
Internet Backbone
EULA
overvoltage
34. Hardware - software - data - people - procedures
biometrics
Information system
network license
mpeg
35. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
optical reader
driver
back door
air mouse
36. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
Desktop Computer
database
virus signature
adware
37. Pressure sensitive eraser shaped pointing device
document management software...
chasis...
pointing stick
bus
38. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
solid state media
virtual provate network
bit
CU
39. The number of bits in an area on a storage medium - Higher density means more storage capacity
density
VR
Processor
transistor
40. Completely Automated Public Turing test to tell Computers and Humans Apart.
CAPTCHA
fiber optic cable
server
air mouse
41. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
cold boot
hypermedia
DSL modem
scanner
42. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
firmware...
optical reader
coaxial cable
preemptive multitasking
43. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
VR world
download
application software...
802.11
44. Mathematical formula that generates a code from the contents of the message
capacity
adware
VR world
hash
45. When businesses use the internet to sell products
formatting
E- retail
warm boot
virus
46. System board- is the main circuit board of the system unit.
Web conference
motherboard
plug- in
GUI
47. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
newsgroup
Mainframe
protocol
System Software...
48. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
dot matrix printer
synthesizer
web filter
communications channel
49. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
network
coaxial cable
hot spot
density
50. The use of computer or network with out permission
backside bus
PIM
unauthorized access
proprietary software...
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests