SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When online meetings take place on the web
hard disk
Hot spots
stylus
Web conference
2. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
audit trail
hypertext
OCR
memory module
3. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
Noise
Dial- up access
Terminal
pretty good Privacy
4. Perpetrator attempts to obtain your personal or financial info.
digital modem
Internet Backbone
phishing
thread
5. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
LAN
cyberextortionist
SMTP
CMOS
6. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
Domain name system
power supply
traffic
device dependant
7. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
overvoltage
cluster
CPU
cross - platform
8. Does not require a newsreader - easier to use than a newsgroup
Processor
Content Aggregator
network license
message board
9. A legal agreement that permits users to install the software on multiple computers.
phishing
Mainframe
microbrowser
site license
10. The original article and all subsequent related replies
TLS
IrDA Port
thread
defragmenting
11. Can connect multiple types of devices that require faster data transmission speeds.
web filter
TLS
FireWire port
unethical employees
12. Internet connections using regular copper telephone lines.
DSL
supercomputer
Netiquette
Software...
13. The number of bytes a storage medium can hold
bit
capacity
optical disc
POST
14. A part of the motherboard and connects the processor to main memory
register
system bus
capacity
synthesizer
15. Random access memory- memory chips that can be read from and written to by the processor and other devices
unauthorized access
RAM
port
byte
16. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
CAM
802.11
System Unit
preemptive multitasking
17. Company that provides wireless internet access to computers
system clock
wireless Internet service provider
spyware
USB hub
18. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
download
hard disk
cross - platform
audit trail
19. Started the internet as a networking project
ARPA
Trojan Horse
ghosting
virus signature
20. A web application that combines services from two or more sources creating a new application.
parallel processing
audit trail
mashup
Mobile Computer
21. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
802.11
W3C
communications channel
commands
22. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
Trojan Horse
PIM
document management software...
ring network
23. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
solid state media
turnaround document
database
wireless access point
24. A communications device that enables a computer or device that does not have a built in networking capability to access a network
shareware...
IP address
network card
embedded computer
25. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
preemptive multitasking
memory slots
Desktop Computer
network topology
26. A program that restricts access to certain material on the web
network card
network architecture
web filter
crimeware
27. Completely Automated Public Turing test to tell Computers and Humans Apart.
crimeware
CAPTCHA
supercomputer
Memory Cache
28. Joins a cable and a port
bus width
device dependant
Information system
connector
29. The process of dividing the disk into tracks and sectors
newsgroup
phishing
formatting
Netbook
30. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
project management software...
TLS
wireless modem
bugs
31. Power on self test to check the various system components and the results are compared with data in a CMOS chip
POST
NAS
MMS
System Unit
32. Protective case for optical discs
air mouse
synthesizer
jewel box
wireless Internet service provider
33. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
network topology
hacker
DLP projector
streaming
34. Acts as an electronic switch that opens or closes the circuit for electrical charges
transistor
Mainframe
USB port
CMOS
35. Contains 10 or fewer comps - with similar reponsibilities and capabilities
peer to peer network
stylus
pretty good Privacy
compromised computer
36. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
nonvolatile memory
L2 cache
connector
optical mouse
37. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
OCR
program
Application software...
communications channel
38. May break in to computer to exploit security weakness. financial gains - revenge.
network card
Servers
capacity
unethical employees
39. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
trackball
System Unit
noise
router
40. Small capacity built directly in the processor chip
L1 cache
biometrics
bit
register
41. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
heat sink
Mainframe
mpeg
spooling
42. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
adware
script kiddie
memory module
Dial up modems
43. Communications activity. Handled by NSFnet.
utility program
cross - platform
utility programs
traffic
44. Donated for public use has no copyright restrictions
public- domain software...
Trojan Horse
ALU
spooling
45. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
touchpad
video card
Intrusion detection software...
system software...
46. Fetching - decoding - executing - storing
File compression utility
machine cycle
Drive Bay
streaming
47. Designed for mobile devices
compromised computer
rootkit
microbrowser
client/server
48. Other computers and mobile devices on the networ that rely on the server for its resources
client
twisted pair cable
DSL modem
access control
49. Has the illusion of moving images becuase it sends a continuos stream of images
OSP
streaming cam
SRAM
groupware...
50. Online service provider- has many members features along with internet access such as IM or Web browsers.
public- domain software...
node
optical disc
OSP