SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Allows the processor to communicate with peripherals.
heat pipe
expansion bus
terminal
CAM
2. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
density
biometrics
bit
network standard
3. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
motherboard
dot matrix printer
client
Notebook Computer
4. Digital light processor uses tiny mirrors to reflect light
LAN
RAID
hard disk
DLP projector
5. A communications device that enables a computer or device that does not have a built in networking capability to access a network
Web conference
Mobile Device
sound card
network card
6. A special purpose computer that functions as a component in a larger product. Small with limited hardware
message board
client/server
embedded computer
streaming cam
7. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
integrated circuit
bus
digital certificate
ASCII
8. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
Laser printer
USB port
Mainframe
Drive Bay
9. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
bus network
expansion slot
driver
twisted pair cable
10. When online meetings take place on the web
device independent
expansion slot
stylus
Web conference
11. Graphic file (JPEG - GIF) slowly replacing GIF
scanner
W3C
PNG
Processor
12. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
Top level domain
embedded computer
spoofing
download
13. A program that hides in a computer and allows someone from a remote location to take control of the computer
heat pipe
rootkit
macros
ghosting
14. PGP an encryption program
pretty good Privacy
plaintext
stored program concept
application software...
15. Consists of electronic components that store instructions waiting to be executed (On motherboard)
wireless modem
video card
pixel
Memory
16. Internet teephony- enables users to speak to other users over the internet
Linux
wireless access point
client
VoIP
17. A communications device that sends and recieves data and info to and from digital line
digital modem
payload
protocol
E- retail
18. Is an online area in which isers have wrtten discussions about a particular subject.
CAPTCHA
newsgroup
Desktop Computer
hot plugging
19. Encrypted data
ciphertext
bus network
mpeg
traffic
20. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
SMTP
GPU
sound card
BIOS
21. A type of always on connection that is established between two communications devices. better than dial up line
ALU
pretty good Privacy
virtual provate network
Dedicated line
22. Allows users to keep typing without using enter at the end of each line
SIMM
adapter cards
ergonomics
wordwrap
23. Small program that tells the operating system how to communicate with a specific device
driver
cyberterrorist
heat pipe
digital certificate
24. Other computers and mobile devices on the networ that rely on the server for its resources
MAN
certificate authority
EFT
client
25. World wide web consortium oversees research and sets standards for many areas of the internet
W3C
telesurgery
macros
System Unit
26. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
Firewall
backside bus
pretty good Privacy
broadband internet service
27. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
port
File compression utility
Storage Device
VR world
28. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
Operating system
virtual provate network
chip
registrar
29. Enahnces the sound generating capabilites of a personal computer
Trojan Horse
network standard
WAN
sound card
30. When turning on a computer that has been turned off completly
cold boot
Noise
dialog box
project management software...
31. Optical mark recognition reads hand drawn marks such as circles or rectangles.
supercomputer
Dial up modems
OMR
digital certificate
32. The code of acceptable behaviors users should follow while on the internet.
Bluetooth
disk cleanup
Netiquette
hypertext
33. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
network architecture
hypermedia
driver
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
34. Mathematical formula that generates a code from the contents of the message
project management software...
pretty good Privacy
hash
volatile memory
35. Provides the user with a physcial response from the device
Fiber to the Premises
synthesizer
IM
tactile output
36. Links in text based documents
cable modem
WAN
hypertext
digital
37. Latest version of Post office Protocol
virus signature
POP3
DRAM
CU
38. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
DSL
telemedicine
Bluetooth
Intrusion detection software...
39. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
power supply
hacker
plug- in
hard disk
40. Uses devices that emit and sense light to detect the mouses movement
EFT
LAN
optical mouse
Web Browser
41. Completely Automated Public Turing test to tell Computers and Humans Apart.
utility programs
CAPTCHA
volatile memory
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
42. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
UNIX
MRAM
PIM
cable modem
43. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
program
optical reader
supercomputer
plaintext
44. Designed for mobile devices
L2 cache
microbrowser
cable modem
rootkit
45. Allows a user to plan schedule and track costs of a project
VR
System Unit
fiber optic cable
project management software...
46. They consist entirely of electronic components and contain no moving parts.
RTLS
business software...
solid state media
transistor
47. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
gender changer
ghosting
communications channel
MICR
48. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
EFT
back door
device independent
bandwidth
49. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
preemptive multitasking
Web Application
Home user
bus width
50. Privately owned and limited to a specific vendor or computer model.
USB hub
newsgroup
access time
proprietary software...
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests