SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
Operating system
DTP
RAID
Web Browser
2. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
Desktop Computer
hot spot
TLS
digital
3. A type of system software that allows users to perform maintenence type tasks
unethical employees
utility program
ISP
Memory
4. Picure messaging can occur from mobile to mobile and mobile to email
VR
address
virus
MMS
5. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
hot plugging
server
Domain name
chip
6. The original article and all subsequent related replies
thread
Desktop Computer
register
Application software...
7. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
Linux
spooling
VR
Drive Bay
8. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
system software...
GPU
disk fragmenter
Noise
9. Saves any open docs or programs to hardisk before removing power
Netbook
online auction
connector
hibernate
10. May break in to computer to exploit security weakness. financial gains - revenge.
unethical employees
Operating system
bit
wireless access point
11. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
payload
heat pipe
broadband internet service
audit trail
12. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
Latency
buffer
coaxial cable
script kiddie
13. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
mpeg
RAM
rootkit
parallel processing
14. The number of bits in an area on a storage medium - Higher density means more storage capacity
density
network topology
chasis...
NAS
15. Smallest element in an electronic image
system software...
pixel
Internet Backbone
utility program
16. Anopening inside the system unit in which you can install additional equipment. Different than a slot
Fiber to the Premises
terminal
proprietary software...
Bay
17. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
Linux
traffic
spooling
Motherboard
18. A cable forms a closed loop with all computers. one direction
ring network
cluster
bus width
ethernet
19. Hypertext transfer protocol
http
tactile output
Personal Computers
Plug and Play
20. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
embedded operating system
program
Personal Computers
botnets
21. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
fault tolerant computer
public- domain software...
document management software...
VAN
22. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
chasis...
synthesizer
POP3
streaming
23. Records in a file both successful and unsuccessful attempts.
Bay
supercomputer
audit trail
SIMM
24. Integrates the functions of a processor - memory and a video card on a single chip.
crimeware
E- commerce
hibernate
system on a chip
25. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
CAD
GPU
RAM
adware
26. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
EDI
RSS 2.0
honeypot
IM
27. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
UNIX
system software...
E- commerce
commands
28. A window that provides info - presents availabe options - or requests a response.
Terminal
Latency
EULA
dialog box
29. The technology of authenticating a persons identity by verifying a personal characteristic.
downloading
tactile output
access control
biometrics
30. Allows a user to plan schedule and track costs of a project
access time
project management software...
network
VoIP
31. A unique number that identifies the location of a byte in memory
system bus
address
EULA
digital certificate
32. Dish shaped antenna for internet connection
fixed wireless
MRAM
hypermedia
embedded operating system
33. Small capacity built directly in the processor chip
connector
L1 cache
capacity
telemedicine
34. (laptop computer) portable personal computer often able to fit in your lap
ASCII
embedded operating system
Notebook Computer
virus
35. A legal agreement that permits users to install the software on multiple computers.
motherboard
Terminal
script kiddie
site license
36. Graphics processing unit controls the manipulation and display of graphics on the display device.
overvoltage
recieving device
GPU
chat client
37. A part of the motherboard and connects the processor to main memory
system bus
device independent
token ring
multifunction peripheral
38. Computer automatically can configure adapter cards and other peripherals as you install them
bus width
USB port
Plug and Play
DTP
39. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
MAN
digital signature
Laser printer
cyberterrorist
40. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
access control
digital forensics
cable modem
macros
41. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
back door
SMTP
network
bus network
42. An instruction that causes a program to perform a specific action.
commands
Mobile Device
adapter card
Intrusion detection software...
43. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
Dial up modems
Personal Computers
adware
44. They can execute more than one instruction per clock cycle
access time
superscalar
botnets
CPU
45. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
proprietary software...
SRAM
document management software...
Memory Cache
46. Read only memory refers to memory chips storing permanent data and instructions (firmware)
disk cleanup
ROM
rootkit
port
47. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
bus
proprietary software...
sound card
48. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
document management software...
DLP projector
device independent
unauthorized access
49. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
Web conference
Noise
power supply
NAS
50. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
access time
DRAM
hibernate
recieving device