SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A document that you return to the company that creates and sends it.
downloading
MICR
turnaround document
System Unit
2. A set of programs that coordinates all of the activies among computer hardware devices.
protocol
Operating system
CMOS
VR world
3. Controls timing of all computer operations
Netiquette
system clock
site license
integrated circuit
4. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
botnets
project management software...
Motherboard
disk fragmenter
5. They consist entirely of electronic components and contain no moving parts.
memory module
Denial of Service attack
solid state media
RAID
6. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
Operating system
Domain name
Memory Cache
Trojan Horse
7. Single chip with two or more processor cores.
buffer
multi- core processor
Laser printer
Dial Up line
8. Initiates an instruction to transmit data - instructions - or information.
DLP projector
multifunction peripheral
utility program
sending device
9. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
touchpad
Web Application
wordwrap
groupware...
10. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
disk controller
ALU
hash
communications channel
11. Each computer or device on the network. often connected by cables
client/server
Trojan Horse
synthesizer
node
12. The last section of the domain name
worm
Top level domain
mpeg
FireWire port
13. Provides the user with a physcial response from the device
memory module
utility programs
virus
tactile output
14. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
GUI
fixed wireless
image processing
Linux
15. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
platter
TLS
ISP
worm
16. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
overvoltage
optical mouse
memory slots
ROM
17. 8 bits grouped together. basic storage unit in memory. Each byte has an address
OMR
cloud storage
gender changer
byte
18. Hides within or looks like a legitimate program such as a screen saver
sending device
DLP projector
Trojan Horse
audit trail
19. Human speech is bc of its continous signal that vary in strength and quality
analog
DSL
turnaround document
memory module
20. The number of bits in an area on a storage medium - Higher density means more storage capacity
Mainframe
adapter card
density
cyberterrorist
21. Obtains data directly at the location where the transaction or event takes place.
phishing
VAN
sending device
data collection device
22. A window that provides info - presents availabe options - or requests a response.
Desktop Computer
dialog box
warm boot
optical reader
23. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
server
kernal
botnets
ergonomics
24. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
unethical employees
Servers
noise
router
25. A program that hides in a computer and allows someone from a remote location to take control of the computer
DLP projector
E- retail
rootkit
PNG
26. Contain permanently writeen data - instructions - and information
kernal
BIOS
firmware...
Web Server
27. A personal computer you can carry from place to place
cluster
Mobile Computer
L2 cache
superscalar
28. Searches for and removes unneccessary files
POST
disk cleanup
register
bit
29. Major carriers of network traffic
DRAM
disk fragmenter
Desktop Computer
Internet Backbone
30. All computers connected to central device. Hub or switch
touchpad
gender changer
Domain name system
star network
31. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
ALU
backside bus
star network
Web Application
32. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
web filter
scanner
ring network
network card
33. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
dialog box
air mouse
hypermedia
expansion slot
34. Program is one that runs the same on multiple operating systems
scanner
FireWire port
stylus
cross - platform
35. Perpetrator attempts to obtain your personal or financial info.
phishing
memory module
solid state media
ALU
36. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
SRAM
Drive Bay
parallel processing
Fiber to the Premises
37. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
Denial of Service attack
thread
neural network
client/server
38. A collection of data organized in a manner that allows access retrieval and use of that data
database
bandwidth
Trojan Horse
disk fragmenter
39. Health care professions conduct live conferences on the computer
SRAM
Top level domain
telemedicine
Personal Computers
40. Latest version of Post office Protocol
heat pipe
ergonomics
Internet Backbone
POP3
41. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
liquid flow technology
cross - platform
Firewall
hard disk
42. A device that enables you to join a port and a connector that are both male or female
parallel processing
DLP projector
gender changer
Dial- up access
43. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
WAN
sleep mode
IrDA Port
DNS Server
44. Saves any open documents and programs to RAM and places computer into a low power state
ASCII
sleep mode
Storage Device
Domain name system
45. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
L2 cache
ergonomics
neural network
NAS
46. Picure messaging can occur from mobile to mobile and mobile to email
W3C
Web Browser
MMS
SMTP
47. Protective case for optical discs
system bus
jewel box
CAD
communications channel
48. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
density
Operating system
adware
hacker
49. An electrical disturbance that can degrade communications
jewel box
wireless Internet service provider
noise
System Unit
50. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
Web Application
commands
network architecture
kernal