SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses fiber optic cable for internet connection.
OSP
Fiber to the Premises
undervoltage
business software...
2. Uses devices that emit and sense light to detect the mouses movement
DIMM
Notebook Computer
optical mouse
transistor
3. Needed generally to participate in a newsgroup
download
OCR
CAPTCHA
newsreader
4. Instead of port - jack is used to identify audio or video ports.
DTP
jack
noise
peripheral
5. A case that contains electronic components of the computer used to process data.
OSP
system unit
scanner
Fiber to the Premises
6. Power on self test to check the various system components and the results are compared with data in a CMOS chip
File compression utility
POST
Internet Backbone
MMS
7. Dish shaped antenna for internet connection
ASCII
Drive Bay
download
fixed wireless
8. Hardware - software - data - people - procedures
bit
Information system
fault tolerant computer
optical reader
9. Integrates the functions of a processor - memory and a video card on a single chip.
Plug and Play
system on a chip
Bay
RIMM
10. A unique number that identifies the location of a byte in memory
CMOS
spooling
driver
address
11. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
Linux
compromised computer
VR world
fixed wireless
12. Processor begins to fetch a second instruction before it completes the full machine cycle
SMTP
IrDA Port
optical mouse
pipelining
13. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
liquid flow technology
Content Aggregator
stored program concept
downloading
14. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
SMTP
nonvolatile memory
Transmission media
POST
15. Small program that tells the operating system how to communicate with a specific device
RAID
driver
Drive Bay
pipelining
16. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
sound card
fiber optic cable
EDI
Mobile Computer
17. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
CAM
hot plugging
Point of Sale terminals
network architecture
18. Contains 10 or fewer comps - with similar reponsibilities and capabilities
Internet Backbone
Memory
peer to peer network
CAM
19. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
cable modem
network topology
peripheral
VR
20. Graphic file (JPEG - GIF) slowly replacing GIF
PNG
parallel processing
spooling
System Software...
21. An instruction that causes a program to perform a specific action.
virus
jack
commands
Storage Media
22. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
data collection device
turnaround document
dialog box
23. Single chip with two or more processor cores.
jack
back door
GPU
multi- core processor
24. Data that has been processed in a useful form- text - graphics - audio - video
shareware...
microbrowser
Output
terminal
25. Provides the user with a physcial response from the device
PNG
streaming
tactile output
Desktop Computer
26. Smaller than heat sink cools processors in notebook comps
Internet Backbone
nonvolatile memory
database
heat pipe
27. Acts as an electronic switch that opens or closes the circuit for electrical charges
gender changer
ALU
message board
transistor
28. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
preemptive multitasking
Linux
drive bay
spooling
29. A type of always on connection that is established between two communications devices. better than dial up line
network
Dedicated line
memory slots
keygen
30. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
hacker
audit trail
GPU
spooling
31. Privately owned and limited to a specific vendor or computer model.
site license
USB port
proprietary software...
OSP
32. Dual inline memory module forms two sets of contact
Bluetooth
DIMM
bus
phishing
33. Computer automatically can configure adapter cards and other peripherals as you install them
hacker
wireless access point
peripheral
Plug and Play
34. Copyrighted software provided at no cost by company that retains all rights to software
PNG
chasis...
peer to peer network
freeware...
35. Any unwanted signal usually varying quickly
IM
cloud storage
transistor
Noise
36. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
Dial- up access
coaxial cable
product activation
L1 cache
37. Is a security measure that defines who can access it and what actions they can take while acessing the computer
access control
superscalar
Memory Cache
proprietary software...
38. The smallest unit of disk space that stores data and info
newsreader
cluster
multi- core processor
CPU
39. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
synthesizer
solid state drive
Denial of Service attack
machine cycle
40. Searches for and removes unneccessary files
disk cleanup
access control
crimeware
Mobile Computer
41. World wide web consortium oversees research and sets standards for many areas of the internet
ALU
bugs
W3C
bus width
42. Cables - telephone lines - radio networks - satellites
SMTP
unethical employees
sleep mode
Transmission media
43. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
network
USB hub
wireless modem
platter
44. A program that restricts access to certain material on the web
web filter
BIOS
digital modem
disk controller
45. Picure messaging can occur from mobile to mobile and mobile to email
web filter
Latency
Top level domain
MMS
46. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
Intrusion detection software...
Personal Computers
message board
sound card
47. The fastest most powerful computer
disk cleanup
backside bus
adapter card
supercomputer
48. The original article and all subsequent related replies
Personal Computers
chasis...
device dependant
thread
49. A type of storage media that consists of flat disc and is written and read by a laser
CU
node
database
optical disc
50. The amount of data - instructions - and information that can travel over communications channel
bandwidth
analog
communications channel
Home user