SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A set of programs that coordinates all of the activies among computer hardware devices.
device independent
Dial- up access
Operating system
Top level domain
2. Case of the system unit to protect internal damage
cyberextortionist
chasis...
hypermedia
download
3. Can be peropheral or chip - creates sound from digital instructions.
player
OSP
synthesizer
Memory
4. Can connect multiple types of devices that require faster data transmission speeds.
noise
FireWire port
utility programs
peripheral
5. Method that the internet uses to store domain names and their corressponding IP addresses
Domain name system
Drive Bay
SMTP
Input
6. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
spooling
online security service
fiber optic cable
Latency
7. Sends digital data and info from a comp to a DSL line
EULA
volatile memory
DSL modem
digital modem
8. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
Dial- up access
spooling
access time
MAN
9. A small flat rectangular pointing device that is sensitive to pressure and motion.
device independent
touchpad
power supply
embedded operating system
10. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
RTLS
TCP/IP
L2 cache
wireless modem
11. Electrical supply drops.can cause data loss but generally not cause equipment damage
undervoltage
802.11
Processor
digital signature
12. Searches for and removes unneccessary files
client
ASCII
disk cleanup
coaxial cable
13. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
RAID
hot plugging
ergonomics
router
14. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
botnets
ghosting
embedded operating system
DNS Server
15. The technology of authenticating a persons identity by verifying a personal characteristic.
optical reader
digital
program
biometrics
16. The design of computers - devices - and media in the network
LAN
audit trail
network architecture
kernal
17. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
system software...
Storage Device
ASCII
CU
18. Screen savors were made to prevent this - which etched images permanently onto the screen
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
Domain name system
ghosting
Latency
19. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
solid state drive
CAPTCHA
ciphertext
application software...
20. A collection of computers and devices connected together - via communications devices and transmissions media.
network
Input
node
Memory
21. A unique number that identifies the location of a byte in memory
utility program
wireless access point
script kiddie
address
22. Random access memory- memory chips that can be read from and written to by the processor and other devices
RAM
virus signature
digital forensics
L1 cache
23. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
DTP
dot matrix printer
recieving device
air mouse
24. Most computers (on and off)
digital
disk fragmenter
Memory
traffic
25. A vulnerable computer that is set up to entice an intruder to break into it.
pretty good Privacy
bugs
embedded computer
honeypot
26. Internet Service Provider- a regional or national access provider
pipelining
VR world
802.11
ISP
27. Allows users to keep typing without using enter at the end of each line
protocol
drive bay
wordwrap
turnaround document
28. Holds one or more disk drives
virus
cold boot
USB port
drive bay
29. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
Mainframe
Noise
Input
ring network
30. Dish shaped antenna for internet connection
fixed wireless
address
data collection device
Web Application
31. Graphical User interface - interact with software using text - graphics - and icons
Latency
buffer
client/server
GUI
32. Uses radio waves to transmit data between two devices.
RIMM
embedded operating system
Bluetooth
trackball
33. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
DSL
Processor
RSS 2.0
Mainframe
34. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
Content Aggregator
business software...
virus
cross - platform
35. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
power supply
drive bay
project management software...
Linux
36. Computer aided design software assists a professional user in creating designs
Web conference
jack
DNS Server
CAD
37. A part of the motherboard and connects the processor to main memory
GUI
back door
system bus
token ring
38. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
spyware
Denial of Service attack
system clock
disk cleanup
39. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
commands
hypertext
Personal Computers
fixed wireless
40. Provides the user with a physcial response from the device
tactile output
integrated circuit
online security service
Laser printer
41. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
embedded operating system
VAN
e- learning
Operating system
42. Controls timing of all computer operations
online security service
Memory Cache
hard disk
system clock
43. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
EULA
preemptive multitasking
public- domain software...
SMTP
44. When turning on a computer that has been turned off completly
cold boot
phishing
mpeg
fixed wireless
45. An instruction that causes a program to perform a specific action.
Trojan Horse
node
commands
pointing stick
46. Designed for mobile devices
dialog box
microbrowser
memory module
honeypot
47. A device that enables you to join a port and a connector that are both male or female
gender changer
digital certificate
proprietary software...
802.11
48. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
IP address
DVI
platter
plug- in
49. Processor begins to fetch a second instruction before it completes the full machine cycle
wireless Internet service provider
cloud storage
pipelining
plug- in
50. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
FireWire port
hypermedia
Intrusion detection software...
sleep mode