SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
document management software...
USB port
multi- core processor
Terminal
2. A set of programs that coordinates all of the activies among computer hardware devices.
Operating system
Web Application
DSL
image processing
3. They consist entirely of electronic components and contain no moving parts.
image processing
solid state media
integrated circuit
audit trail
4. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
expansion slot
Communications device
cable modem
crimeware
5. Dynamic ram- chips must be re energized constantly or they lose their contents.
IM
DRAM
broadband internet service
jewel box
6. A web application that combines services from two or more sources creating a new application.
plaintext
Transmission media
mashup
Output
7. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
warm boot
digital modem
hot plugging
File compression utility
8. A real time internet communications service where you can talk to people online.
IM
overvoltage
register
software suite
9. Determines the number of bits that can be transmitted at one time
bus width
E- commerce
network architecture
RAID
10. A know specific pattern of virus code.
dialog box
L1 cache
virus signature
worm
11. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
OSP
buffer
newsreader
cross - platform
12. Computing device small enough to hold in your hand
density
Mobile Device
unauthorized access
network card
13. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
image processing
ethernet
ISP
protocol
14. A type of system software that allows users to perform maintenence type tasks
device dependant
http
solid state drive
utility program
15. Extends the capabilites of a browser.
plug- in
sleep mode
parallel processing
Dial Up line
16. Provides the user with a physcial response from the device
LAN
telemedicine
power supply
tactile output
17. Program is one that runs the same on multiple operating systems
phishing
cross - platform
Communications device
Processor
18. Contains many microscopic pathways capable of carrying an electrical current
honeypot
Web Browser
integrated circuit
formatting
19. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
proxy server
formatting
compromised computer
L2 cache
20. Privately owned and limited to a specific vendor or computer model.
Storage Media
synthesizer
Desktop Computer
proprietary software...
21. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
pointing stick
network
access time
player
22. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
backside bus
Laser printer
Information system
utility program
23. An instruction that causes a program to perform a specific action.
disk cleanup
commands
utility programs
IrDA Port
24. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
mashup
defragmenting
optical reader
L2 cache
25. Rambus inline memory module house RDRAM chips
bandwidth
protocol
RIMM
expansion slot
26. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
Plug and Play
SRAM
animated Gif...
twisted pair cable
27. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
Plug and Play
multifunction peripheral
hot spot
Latency
28. Type of notebook comp that is smaller and less powerful than a normal notebook comp
Output
spoofing
TLS
Netbook
29. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
Web Browser
client
nonvolatile memory
hard disk
30. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
adapter card
byte
expansion bus
System Unit
31. A legal agreement that permits users to install the software on multiple computers.
http
site license
sound card
Operating system
32. Fetching - decoding - executing - storing
telesurgery
streaming
machine cycle
Web Server
33. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
Laser printer
tactile output
expansion bus
File compression utility
34. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
ciphertext
application software...
OCR
macros
35. Integrates the functions of a processor - memory and a video card on a single chip.
system on a chip
digital forensics
system unit
network
36. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
cracker
Point of Sale terminals
touchpad
digital
37. Provids mobile users with a secure connection to the company server as if the user has a private line.
virtual provate network
mpeg
fault tolerant computer
telesurgery
38. A collection of data organized in a manner that allows access retrieval and use of that data
ghosting
analog
database
Linux
39. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
crimeware
unethical employees
RFID
EFT
40. Electrical supply drops.can cause data loss but generally not cause equipment damage
client/server
DNS Server
undervoltage
twisted pair cable
41. Health care professions conduct live conferences on the computer
telemedicine
disk controller
bandwidth
Motherboard
42. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
Information system
online security service
802.11
worm
43. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
bus width
drive bay
Denial of Service attack
digital forensics
44. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
Output
Mainframe
DTP
keygen
45. Graphic file (JPEG - GIF) slowly replacing GIF
PNG
sound card
device dependant
trackball
46. Is an online area in which isers have wrtten discussions about a particular subject.
newsgroup
wireless modem
embedded operating system
PNG
47. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
plug- in
motherboard
hacker
router
48. Popular for LAN. single central cable.
chat client
bus network
virus signature
plaintext
49. Links in text based documents
kernal
hypertext
MAN
commands
50. Reorganizing it so that the files are store in continous sectors
defragmenting
turnaround document
VoIP
USB port