SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Serves as the interface between the user - the app software - and the computers hardware
disk controller
system software...
Plug and Play
unethical employees
2. CA resposible for giving out digital certificate
capacity
certificate authority
warm boot
hash
3. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
bus width
shareware...
registrar
network
4. A part of the motherboard and connects the processor to main memory
sleep mode
Hot spots
system bus
certificate authority
5. The design of computers - devices - and media in the network
network architecture
802.11
Intrusion detection software...
address
6. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
IP address
wordwrap
Servers
product activation
7. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
coaxial cable
platter
address
wireless Internet service provider
8. Screen savors were made to prevent this - which etched images permanently onto the screen
broadband internet service
ghosting
business software...
adapter cards
9. Media transmit multiple signals simutaneously. Download faster than upload
BIOS
broadband
expansion slot
server
10. Type of notebook comp that is smaller and less powerful than a normal notebook comp
ergonomics
fault tolerant computer
optical reader
Netbook
11. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
Software...
bit
TCP/IP
memory slots
12. Program that euns only on a specific type or make of computer
device dependant
wireless Internet service provider
token ring
online auction
13. Method that the internet uses to store domain names and their corressponding IP addresses
Domain name system
CAPTCHA
Bluetooth
multifunction peripheral
14. Instead of port - jack is used to identify audio or video ports.
utility program
turnaround document
communications channel
jack
15. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
optical reader
network topology
communications
solid state drive
16. Picure messaging can occur from mobile to mobile and mobile to email
Netiquette
BIOS
rootkit
MMS
17. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
access time
backside bus
Domain name
cyberterrorist
18. An instruction that causes a program to perform a specific action.
video card
commands
fixed wireless
node
19. The destructive event or prank the program intended to deliver
web filter
defragmenting
payload
keygen
20. A collection of data organized in a manner that allows access retrieval and use of that data
overvoltage
network
IrDA Port
database
21. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
RIMM
hot spot
telesurgery
ASCII
22. Designed for mobile devices
microbrowser
message board
DTP
terminal
23. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
superscalar
SRAM
script kiddie
formatting
24. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
stylus
System Software...
virus
Firewall
25. Graphics processing unit controls the manipulation and display of graphics on the display device.
Transmission media
pretty good Privacy
GPU
MRAM
26. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
cyberextortionist
BIOS
plug- in
network architecture
27. Joins a cable and a port
VAN
connector
parallel processing
utility programs
28. A socket in the motherboard that can hold an adapter card
buffer
expansion slot
proxy server
token ring
29. A real time internet communications service where you can talk to people online.
Point of Sale terminals
hot spot
system bus
IM
30. Special software to listen to audio
dialog box
Trojan Horse
streaming cam
player
31. Power on self test to check the various system components and the results are compared with data in a CMOS chip
POST
expansion bus
coaxial cable
chasis...
32. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
parallel processing
Servers
pointing stick
Desktop Computer
33. They consist entirely of electronic components and contain no moving parts.
Latency
CERT/CC
solid state media
cyberterrorist
34. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
cold boot
DLP projector
peripheral
DNS Server
35. A case that contains electronic components of the computer used to process data.
system unit
online auction
warm boot
digital signature
36. Universal serial bus port connects peripherals to the computer
driver
transistor
USB port
Netiquette
37. Allows users to keep typing without using enter at the end of each line
wordwrap
driver
Memory
utility programs
38. Saves any open documents and programs to RAM and places computer into a low power state
sleep mode
DSL modem
Content Aggregator
volatile memory
39. A communications device that sends and recieves data and info to and from digital line
liquid flow technology
digital modem
worm
embedded computer
40. Basic input/output systemis firmware that contains the computers startup instructions
product activation
http
expansion slot
BIOS
41. Reorganizing it so that the files are store in continous sectors
site license
defragmenting
recieving device
neural network
42. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
protocol
Latency
802.11
device independent
43. Graphic file (JPEG - GIF) slowly replacing GIF
Intrusion detection software...
Dial Up line
worm
PNG
44. On the motherboard hold memory modules
System Unit
Servers
memory slots
solid state media
45. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
cluster
memory module
player
address
46. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
Servers
hash
CAM
preemptive multitasking
47. Small capacity built directly in the processor chip
L1 cache
jack
sending device
bus
48. The fastest most powerful computer
digital certificate
supercomputer
telesurgery
chasis...
49. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
DVI
gender changer
botnets
sound card
50. Any data or instructions entered into the memory of the computer
bus network
WAN
Input
cloud storage