SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Connects the processor to cache.
system software...
registrar
backside bus
crimeware
2. Health care professions conduct live conferences on the computer
telemedicine
sending device
VR world
DLP projector
3. Builds and maintains lists of words found on websites. Useful for search engines
CAD
utility program
spider
utility programs
4. Storage over an internet service
DLP projector
volatile memory
access time
cloud storage
5. Small capacity built directly in the processor chip
L1 cache
E- retail
VAN
bugs
6. Short for key generator creats software registration numbers and sometimes activation codes.
Latency
document management software...
keygen
spider
7. A cable forms a closed loop with all computers. one direction
crimeware
ring network
http
worm
8. Picure messaging can occur from mobile to mobile and mobile to email
MMS
CAPTCHA
peripheral
crimeware
9. Dual inline memory module forms two sets of contact
optical reader
RAID
DIMM
SMTP
10. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
trackball
program
virus signature
spider
11. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
hibernate
air mouse
Dedicated line
Firewall
12. When businesses use the internet to sell products
message board
E- retail
bus network
IM
13. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
OMR
VR
sleep mode
Mobile Device
14. ...
plaintext
volatile memory
chat client
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
15. Internet teephony- enables users to speak to other users over the internet
coaxial cable
VoIP
script kiddie
utility programs
16. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
VAN
TCP/IP
W3C
wireless Internet service provider
17. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
cluster
document management software...
newsgroup
network standard
18. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
adapter card
memory module
ROM
embedded operating system
19. A communications device that sends and recieves data and info to and from digital line
streaming cam
L1 cache
bus width
digital modem
20. Donated for public use has no copyright restrictions
ARPA
public- domain software...
chip
digital signature
21. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
online security service
server
bus
expansion slot
22. An instruction that causes a program to perform a specific action.
commands
client
OCR
telemedicine
23. A small flat rectangular pointing device that is sensitive to pressure and motion.
touchpad
spoofing
CMOS
downloading
24. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
client
OCR
VoIP
DRAM
25. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
chip
streaming cam
disk cleanup
OSP
26. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
MAN
parallel processing
software suite
Plug and Play
27. A device that enables you to join a port and a connector that are both male or female
Content Aggregator
gender changer
certificate authority
Mobile Computer
28. Dish shaped antenna for internet connection
cloud storage
fixed wireless
fault tolerant computer
memory slots
29. Is an online area in which isers have wrtten discussions about a particular subject.
scanner
newsgroup
Personal Computers
optical reader
30. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
VAN
fiber optic cable
Top level domain
Transmission media
31. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
RSS 2.0
cracker
pretty good Privacy
CERT/CC
32. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
DSL
newsreader
multifunction peripheral
system software...
33. A computer that delivers requested web pages to your computer
Web Server
byte
Personal Computers
message board
34. Federally funded internet security research and development center
address
access time
RFID
CERT/CC
35. Transmits data via infared light waves.. Both computer and device must have the port for it to work
RSS 2.0
IrDA Port
Notebook Computer
client
36. The smallest unit of disk space that stores data and info
cluster
animated Gif...
worm
spyware
37. Human speech is bc of its continous signal that vary in strength and quality
business software...
analog
star network
peripheral
38. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
L2 cache
hash
POST
EDI
39. A communications device that enables a computer or device that does not have a built in networking capability to access a network
neural network
TLS
IP address
network card
40. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
Netiquette
Servers
worm
Denial of Service attack
41. The fastest most powerful computer
supercomputer
spider
volatile memory
bus
42. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
connector
pretty good Privacy
terminal
port
43. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
DLP projector
GPU
Memory
MICR
44. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
spooling
pipelining
RTLS
RSS 2.0
45. Smaller than heat sink cools processors in notebook comps
rootkit
cyberextortionist
heat pipe
biometrics
46. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
Dial- up access
Web Browser
OSP
keygen
47. On the motherboard hold memory modules
analog
protocol
memory slots
Web conference
48. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
Processor
Mobile Device
hibernate
wordwrap
49. Perpetrator attempts to obtain your personal or financial info.
router
keygen
phishing
cluster
50. The standard that outlines characteristics of how two network devices communicate
Content Aggregator
program
protocol
DTP