SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
twisted pair cable
jewel box
newsgroup
Transmission media
2. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
Intrusion detection software...
RAID
download
DSL
3. Saves any open documents and programs to RAM and places computer into a low power state
PIM
sleep mode
IrDA Port
CMOS
4. The number of bytes a storage medium can hold
IP address
thread
capacity
liquid flow technology
5. Retains existing application software and data files even if you can change computer models or vendors
GPU
EFT
dot matrix printer
device independent
6. Allows a user to plan schedule and track costs of a project
peer to peer network
Memory
project management software...
client
7. Single inline memory module forms a single set of contacts
expansion slot
SIMM
formatting
stored program concept
8. Screen savors were made to prevent this - which etched images permanently onto the screen
RSS 2.0
ghosting
dot matrix printer
virus
9. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
scanner
IM
adware
peripheral
10. The technology of authenticating a persons identity by verifying a personal characteristic.
CMOS
biometrics
video card
bit
11. Internet Service Provider- a regional or national access provider
ISP
DVI
IrDA Port
VR world
12. Storage over an internet service
back door
SIMM
MMS
cloud storage
13. The use of computer or network with out permission
compromised computer
buffer
Software...
unauthorized access
14. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
DSL
node
utility program
trackball
15. Basic input/output systemis firmware that contains the computers startup instructions
BIOS
noise
preemptive multitasking
DIMM
16. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
utility program
drive bay
Communications device
power supply
17. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
SMTP
pipelining
spider
node
18. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
Linux
adapter cards
message board
CAPTCHA
19. Method that the internet uses to store domain names and their corressponding IP addresses
mashup
Domain name system
access time
ARPA
20. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
Web Browser
IrDA Port
Personal Computers
communications channel
21. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
peer to peer network
Servers
back door
Web Server
22. Loses its contents when power is turned off (RAM)
capacity
L2 cache
web filter
volatile memory
23. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
overvoltage
wireless modem
broadband
Processor
24. A type of storage media that consists of flat disc and is written and read by a laser
optical disc
address
botnets
network
25. Donated for public use has no copyright restrictions
Web Browser
Noise
peer to peer network
public- domain software...
26. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
worm
air mouse
adapter card
machine cycle
27. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
cloud storage
disk controller
bugs
VoIP
28. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
CPU
router
client
address
29. Federally funded internet security research and development center
multi- core processor
mashup
RAID
CERT/CC
30. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
proxy server
IM
corporate spies
undervoltage
31. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
System Software...
drive bay
stylus
CAM
32. Accepts the transmission of data - instructions - or info
PNG
recieving device
bus width
cloud storage
33. Hardware - software - data - people - procedures
Information system
system software...
unethical employees
virtual provate network
34. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
cluster
neural network
terminal
machine cycle
35. A type of always on connection that is established between two communications devices. better than dial up line
Dedicated line
compromised computer
adapter card
adapter cards
36. A system that attempts to imitate the behavior of a human brain.
digital forensics
DNS Server
neural network
E- commerce
37. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
cluster
chat client
DTP
CMOS
38. The fastest most powerful computer
FireWire port
supercomputer
multi- core processor
SIMM
39. Two main parts are processor and memory.
IM
device independent
player
Motherboard
40. Searches for and removes unneccessary files
audit trail
IM
NAS
disk cleanup
41. Can connect multiple types of devices that require faster data transmission speeds.
keygen
FireWire port
expansion slot
network topology
42. Connects the processor to cache.
E- commerce
firmware...
backside bus
power supply
43. Computer automatically can configure adapter cards and other peripherals as you install them
OMR
trackball
Plug and Play
Mobile Computer
44. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
cracker
jewel box
download
VR world
45. Mathematical formula that generates a code from the contents of the message
Latency
Netbook
hash
spyware
46. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
Communications device
Domain name
chip
47. Personal information manager is application software that includes features to help users organize personal info
program
E- commerce
PIM
animated Gif...
48. Is an online area in which isers have wrtten discussions about a particular subject.
newsgroup
phishing
LAN
MMS
49. Text version of an IP address
business software...
telemedicine
Domain name
RTLS
50. Pressure sensitive eraser shaped pointing device
kernal
File compression utility
Mobile Device
pointing stick