SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Special software to listen to audio
Noise
player
business software...
NAS
2. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
connector
scanner
compromised computer
IM
3. Extends the capabilites of a browser.
turnaround document
bus width
File compression utility
plug- in
4. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
spoofing
DNS Server
telesurgery
document management software...
5. Personal information manager is application software that includes features to help users organize personal info
Memory Cache
Storage Media
PIM
ethernet
6. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
address
register
system unit
memory module
7. Other computers and mobile devices on the networ that rely on the server for its resources
tactile output
client
Dial Up line
stored program concept
8. A small metal or plastic device that uses pressure instead of ink.
Noise
stylus
digital forensics
system bus
9. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
hash
microbrowser
hard disk
Operating system
10. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
Web Application
OMR
optical reader
access time
11. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
access time
adapter cards
firmware...
byte
12. Health care professions conduct live conferences on the computer
VoIP
application software...
telemedicine
dot matrix printer
13. A device that enables you to join a port and a connector that are both male or female
multifunction peripheral
system software...
gender changer
stored program concept
14. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
e- learning
connector
Transmission media
hypermedia
15. A system that attempts to imitate the behavior of a human brain.
BIOS
neural network
CU
Terminal
16. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
shareware...
utility program
Memory Cache
spoofing
17. Copyrighted software provided at no cost by company that retains all rights to software
DSL
streaming
hibernate
freeware...
18. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
communications channel
adware
digital
neural network
19. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
platter
unethical employees
Desktop Computer
mpeg
20. Allows a user to plan schedule and track costs of a project
IM
Servers
application software...
project management software...
21. An electrical disturbance that can degrade communications
byte
access time
noise
sending device
22. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
DTP
MICR
token ring
OMR
23. Read only memory refers to memory chips storing permanent data and instructions (firmware)
density
DVI
buffer
ROM
24. Controls timing of all computer operations
system clock
ISP
hot plugging
sending device
25. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
Processor
registrar
Denial of Service attack
L2 cache
26. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
online security service
connector
digital certificate
router
27. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
spooling
ROM
heat sink
Domain name system
28. Hardware - software - data - people - procedures
hot spot
network license
USB hub
Information system
29. On the motherboard hold memory modules
memory slots
ROM
Storage Device
EDI
30. Obtains data directly at the location where the transaction or event takes place.
data collection device
wordwrap
terminal
cyberextortionist
31. 8 bits grouped together. basic storage unit in memory. Each byte has an address
client
byte
MAN
bus
32. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
utility program
trackball
motherboard
multifunction peripheral
33. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
cyberextortionist
Motherboard
ALU
VAN
34. Computing device small enough to hold in your hand
network topology
Mobile Device
commands
overvoltage
35. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
spyware
motherboard
player
twisted pair cable
36. Pressure sensitive eraser shaped pointing device
digital signature
site license
pointing stick
Point of Sale terminals
37. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
pipelining
File compression utility
driver
parallel processing
38. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
Communications device
unauthorized access
commands
RAID
39. A vulnerable computer that is set up to entice an intruder to break into it.
video card
Linux
honeypot
bit
40. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
solid state drive
Storage Device
Bay
File compression utility
41. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
superscalar
proprietary software...
macros
network
42. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
Storage Media
overvoltage
hypermedia
Transmission media
43. Rambus inline memory module house RDRAM chips
bus width
RIMM
ring network
Denial of Service attack
44. Copyrighted software that is distributed at no cost for a trial period
registrar
Servers
stylus
shareware...
45. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
Home user
TLS
Internet Backbone
kernal
46. Universal serial bus port connects peripherals to the computer
USB port
Firewall
ASCII
CAD
47. Communications activity. Handled by NSFnet.
FireWire port
project management software...
Content Aggregator
traffic
48. The process of dividing the disk into tracks and sectors
802.11
File compression utility
web filter
formatting
49. Hides within or looks like a legitimate program such as a screen saver
Web Server
Trojan Horse
ALU
RFID
50. Company that provides wireless internet access to computers
wireless Internet service provider
Terminal
hypertext
wireless access point