SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
DVI
site license
TLS
MICR
2. A collection of computers and devices connected together - via communications devices and transmissions media.
disk cleanup
hot plugging
network
Domain name
3. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
hot spot
machine cycle
memory module
802.11
4. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
embedded operating system
ethernet
system software...
Memory
5. Copyrighted software provided at no cost by company that retains all rights to software
web filter
Mobile Device
freeware...
expansion slot
6. A device that enables you to join a port and a connector that are both male or female
bus
gender changer
rootkit
L1 cache
7. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
L1 cache
access control
Communications device
cloud storage
8. Used to gain competitive advantage
newsgroup
bugs
corporate spies
utility programs
9. Read only memory refers to memory chips storing permanent data and instructions (firmware)
kernal
fixed wireless
dot matrix printer
ROM
10. Dynamic ram- chips must be re energized constantly or they lose their contents.
DRAM
Memory
buffer
stylus
11. Other computers and mobile devices on the networ that rely on the server for its resources
IM
Netiquette
client
address
12. Loses its contents when power is turned off (RAM)
volatile memory
Top level domain
public- domain software...
keygen
13. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
Laser printer
POP3
worm
hash
14. zombie
compromised computer
payload
Mainframe
utility program
15. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
hash
cyberextortionist
DTP
sound card
16. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
integrated circuit
virus signature
trackball
CERT/CC
17. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
MRAM
synthesizer
Laser printer
telemedicine
18. On the motherboard hold memory modules
adapter card
EDI
network
memory slots
19. Surgeon performs operation by controlling robot when not in the same area as patient.
site license
mpeg
VoIP
telesurgery
20. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
NAS
router
program
player
21. Organization that sells and manages domain names
synthesizer
registrar
bus width
turnaround document
22. The destructive event or prank the program intended to deliver
virtual provate network
system on a chip
liquid flow technology
payload
23. Provides the user with a physcial response from the device
tactile output
noise
Communications device
DTP
24. Protective case for optical discs
heat sink
telesurgery
cyberterrorist
jewel box
25. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
VAN
network topology
VR world
cloud storage
26. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
server
project management software...
telesurgery
digital signature
27. A small flat rectangular pointing device that is sensitive to pressure and motion.
OSP
touchpad
preemptive multitasking
IM
28. The smallest unit of disk space that stores data and info
cluster
integrated circuit
project management software...
RFID
29. Smallest element in an electronic image
Denial of Service attack
Memory
system on a chip
pixel
30. The number of bytes a storage medium can hold
PNG
corporate spies
capacity
IP address
31. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
CPU
ROM
IM
application software...
32. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
Laser printer
spooling
RSS 2.0
embedded computer
33. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
Web Browser
worm
network topology
access control
34. Digital light processor uses tiny mirrors to reflect light
DLP projector
RAID
Intrusion detection software...
DNS Server
35. The delivery of education via some electronic method such as the internet - networks - or optical disks.
e- learning
keygen
corporate spies
address
36. Hardware - software - data - people - procedures
ROM
Information system
downloading
unauthorized access
37. A small metal or plastic device that uses pressure instead of ink.
stylus
audit trail
compromised computer
terminal
38. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
virtual provate network
TCP/IP
plug- in
router
39. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
utility program
defragmenting
liquid flow technology
nonvolatile memory
40. Errors that can be recognized by automatic update
bugs
bus width
online auction
Dial up modems
41. Single chip with two or more processor cores.
hypertext
system unit
noise
multi- core processor
42. Dual inline memory module forms two sets of contact
CU
telesurgery
DIMM
optical disc
43. A window that provides info - presents availabe options - or requests a response.
firmware...
warm boot
dialog box
digital certificate
44. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
Application software...
RAM
DIMM
network card
45. One or more computers on the network request services from the server. 10 or more computers
utility programs
transistor
client/server
spooling
46. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
DRAM
disk cleanup
payload
dot matrix printer
47. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
gender changer
Top level domain
ASCII
cable modem
48. Contain permanently writeen data - instructions - and information
firmware...
phishing
broadband
chasis...
49. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
jack
air mouse
Dial- up access
DSL
50. Operating system on mobile devices that generally resides on ROM
proprietary software...
system unit
embedded operating system
utility program