SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A personal computer you can carry from place to place
bandwidth
Mobile Computer
freeware...
embedded computer
2. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
ALU
POST
jewel box
Web conference
3. The smallest unit of disk space that stores data and info
stored program concept
message board
Trojan Horse
cluster
4. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
ciphertext
gender changer
utility programs
system unit
5. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
CERT/CC
optical reader
ghosting
VR
6. Needed generally to participate in a newsgroup
trackball
Bay
star network
newsreader
7. Random access memory- memory chips that can be read from and written to by the processor and other devices
Web Application
RAM
utility program
Transmission media
8. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
digital signature
Web conference
macros
bus width
9. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
cloud storage
adware
TCP/IP
ASCII
10. A program that restricts access to certain material on the web
online auction
disk fragmenter
fault tolerant computer
web filter
11. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
Communications device
DTP
chat client
hard disk
12. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
trackball
EDI
ciphertext
disk cleanup
13. World wide web consortium oversees research and sets standards for many areas of the internet
SIMM
SRAM
W3C
cyberextortionist
14. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
spyware
wireless access point
ergonomics
Application software...
15. Transmits data via infared light waves.. Both computer and device must have the port for it to work
CAPTCHA
L1 cache
Point of Sale terminals
IrDA Port
16. System board- is the main circuit board of the system unit.
motherboard
Latency
CPU
DTP
17. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
PNG
NAS
system unit
Bluetooth
18. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
BIOS
tactile output
integrated circuit
application software...
19. Graphical User interface - interact with software using text - graphics - and icons
PNG
web filter
Netbook
GUI
20. ...
Personal Computers
disk fragmenter
DRAM
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
21. Hypertext transfer protocol
motherboard
http
port
cable modem
22. Power on self test to check the various system components and the results are compared with data in a CMOS chip
ROM
POST
utility program
turnaround document
23. zombie
compromised computer
crimeware
disk cleanup
byte
24. Controls timing of all computer operations
audit trail
system clock
microbrowser
network architecture
25. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
hard disk
Information system
proxy server
VoIP
26. The technology of authenticating a persons identity by verifying a personal characteristic.
CMOS
Point of Sale terminals
biometrics
access control
27. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
PNG
embedded operating system
CAM
Bluetooth
28. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
hypermedia
communications channel
pipelining
fiber optic cable
29. A legal agreement that allows multiple users to access the software on the server simutaneously
freeware...
utility programs
network license
transistor
30. Perpetrator attempts to obtain your personal or financial info.
phishing
application software...
undervoltage
RTLS
31. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
network
online security service
FireWire port
Web conference
32. A family member on a computer
Home user
DRAM
port
digital signature
33. Enahnces the sound generating capabilites of a personal computer
ASCII
hot spot
business software...
sound card
34. Broadband modem- sends and recives digital data over the cable television
payload
Web conference
ROM
cable modem
35. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
L1 cache
VAN
jack
System Unit
36. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
back door
access control
wireless access point
disk fragmenter
37. A program that hides in a computer and allows someone from a remote location to take control of the computer
CAD
address
rootkit
script kiddie
38. Donated for public use has no copyright restrictions
public- domain software...
USB hub
DRAM
buffer
39. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
disk controller
drive bay
BIOS
Software...
40. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
scanner
E- commerce
cracker
capacity
41. Optical mark recognition reads hand drawn marks such as circles or rectangles.
CU
digital certificate
OMR
CAD
42. Health care professions conduct live conferences on the computer
ARPA
plug- in
telemedicine
superscalar
43. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
multifunction peripheral
Point of Sale terminals
download
Notebook Computer
44. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
POST
stylus
warm boot
address
45. They can execute more than one instruction per clock cycle
disk fragmenter
superscalar
biometrics
telesurgery
46. Used to track and identify the location of high risk or high value items.
RTLS
product activation
commands
WAN
47. Records in a file both successful and unsuccessful attempts.
server
project management software...
pretty good Privacy
audit trail
48. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
system bus
expansion bus
Storage Media
Denial of Service attack
49. Serves as the interface between the user - the app software - and the computers hardware
system software...
POST
wordwrap
groupware...
50. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
rootkit
router
system bus
jack