SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Controls timing of all computer operations
honeypot
embedded computer
system clock
software suite
2. A know specific pattern of virus code.
biometrics
multifunction peripheral
defragmenting
virus signature
3. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
product activation
analog
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
WAN
4. Device with a monitor - keyboard - and memory
rootkit
Terminal
program
Mobile Computer
5. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
groupware...
DNS Server
adapter cards
Firewall
6. A number that uniquely identifies each computer or device connected to the internet (0-255)
Dial up modems
shareware...
network license
IP address
7. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
bus network
DTP
File compression utility
hypertext
8. Anopening inside the system unit in which you can install additional equipment. Different than a slot
Bay
crimeware
Memory Cache
RAID
9. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
player
twisted pair cable
Web Application
RAID
10. Obtains data directly at the location where the transaction or event takes place.
cold boot
hacker
data collection device
Netiquette
11. Program that euns only on a specific type or make of computer
wordwrap
device dependant
cloud storage
IM
12. A collection of computers and devices connected together - via communications devices and transmissions media.
document management software...
network
spyware
IM
13. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
video card
peer to peer network
802.11
spoofing
14. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
VAN
jewel box
Noise
embedded computer
15. Needed generally to participate in a newsgroup
broadband
newsreader
chip
Trojan Horse
16. A small metal or plastic device that uses pressure instead of ink.
stylus
DIMM
gender changer
expansion slot
17. Completely Automated Public Turing test to tell Computers and Humans Apart.
CAPTCHA
program
broadband internet service
download
18. Contains 10 or fewer comps - with similar reponsibilities and capabilities
download
E- commerce
peer to peer network
client/server
19. When online meetings take place on the web
message board
Web conference
parallel processing
Output
20. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
FireWire port
access time
embedded operating system
PNG
21. Uses fiber optic cable for internet connection.
Storage Media
Netiquette
bus
Fiber to the Premises
22. Is a security measure that defines who can access it and what actions they can take while acessing the computer
air mouse
communications channel
fault tolerant computer
access control
23. Accepts the transmission of data - instructions - or info
e- learning
recieving device
compromised computer
terminal
24. The smallest unit of disk space that stores data and info
communications channel
sending device
synthesizer
cluster
25. A communications device that sends and recieves data and info to and from digital line
digital modem
Mobile Computer
fault tolerant computer
jewel box
26. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
bus network
SMTP
streaming cam
bus
27. Links in text based documents
superscalar
hypertext
VoIP
Operating system
28. Someone who accesses a computer or network illegally. Some say they hack to improve security
hacker
Dedicated line
ISP
Domain name system
29. The delivery of education via some electronic method such as the internet - networks - or optical disks.
SIMM
cyberextortionist
connector
e- learning
30. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
document management software...
DSL
phishing
network license
31. Major carriers of network traffic
wireless access point
RFID
Laser printer
Internet Backbone
32. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
cluster
wireless modem
node
http
33. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
token ring
Mainframe
trackball
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
34. A colection of individual programs available together as a unit. lower cost and ease of use
software suite
Home user
digital signature
Drive Bay
35. Short for key generator creats software registration numbers and sometimes activation codes.
router
keygen
mashup
utility programs
36. A server that you connect to to start a chat session.
project management software...
driver
DSL modem
chat client
37. A system that attempts to imitate the behavior of a human brain.
Notebook Computer
dialog box
neural network
backside bus
38. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
bugs
CAD
dot matrix printer
jack
39. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
animated Gif...
bugs
port
program
40. Copyrighted software provided at no cost by company that retains all rights to software
GUI
freeware...
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
turnaround document
41. Consumer consumer e commerce.
IrDA Port
online auction
disk controller
machine cycle
42. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
Storage Media
Software...
Transmission media
pretty good Privacy
43. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
hard disk
Bay
server
spyware
44. Any data or instructions entered into the memory of the computer
Input
communications channel
botnets
DVI
45. Online service provider- has many members features along with internet access such as IM or Web browsers.
OSP
Firewall
Dedicated line
SRAM
46. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
Intrusion detection software...
hard disk
heat sink
video card
47. Popular for LAN. single central cable.
expansion bus
broadband
bus network
Intrusion detection software...
48. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
L2 cache
broadband internet service
multifunction peripheral
LAN
49. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
Web Application
L1 cache
access control
pretty good Privacy
50. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
broadband internet service
Processor
power supply
Domain name system