SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Computer automatically can configure adapter cards and other peripherals as you install them
spoofing
utility program
Plug and Play
DSL modem
2. Random access memory- memory chips that can be read from and written to by the processor and other devices
virus
online auction
parallel processing
RAM
3. Connects the processor to cache.
backside bus
corporate spies
Application software...
File compression utility
4. The process if a computer or device recieveing info info from the server on the internet
W3C
downloading
peripheral
public- domain software...
5. A cable forms a closed loop with all computers. one direction
broadband
cross - platform
CAD
ring network
6. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
dot matrix printer
system clock
RSS 2.0
heat sink
7. A personal computer you can carry from place to place
volatile memory
node
Mobile Computer
wireless Internet service provider
8. Builds and maintains lists of words found on websites. Useful for search engines
integrated circuit
PNG
EULA
spider
9. The technology of authenticating a persons identity by verifying a personal characteristic.
Output
Memory
online auction
biometrics
10. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
Memory Cache
cyberterrorist
solid state drive
LAN
11. A special purpose computer that functions as a component in a larger product. Small with limited hardware
CERT/CC
Drive Bay
embedded computer
Plug and Play
12. Data that has been processed in a useful form- text - graphics - audio - video
pretty good Privacy
Output
document management software...
hot spot
13. Donated for public use has no copyright restrictions
Dial Up line
macros
public- domain software...
backside bus
14. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
EULA
UNIX
DVI
protocol
15. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
document management software...
platter
cross - platform
payload
16. Single chip with two or more processor cores.
multi- core processor
disk controller
digital modem
unauthorized access
17. PGP an encryption program
L2 cache
pretty good Privacy
connector
Content Aggregator
18. The standard that outlines characteristics of how two network devices communicate
protocol
heat sink
L2 cache
Denial of Service attack
19. Protective case for optical discs
Web Application
jewel box
stored program concept
peer to peer network
20. Combines several GIF images ina single GIF file.
payload
animated Gif...
DSL
ARPA
21. Computer aided design software assists a professional user in creating designs
SIMM
CAD
virtual provate network
adapter card
22. Reorganizing it so that the files are store in continous sectors
defragmenting
PIM
node
commands
23. Software that helps groups of people work together on projects and share info over a network
groupware...
ALU
embedded operating system
RAID
24. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
software suite
groupware...
program
digital signature
25. The code of acceptable behaviors users should follow while on the internet.
pretty good Privacy
Netiquette
Web Server
router
26. The number of bits in an area on a storage medium - Higher density means more storage capacity
adapter card
density
CMOS
Top level domain
27. Smaller than heat sink cools processors in notebook comps
disk controller
heat pipe
unauthorized access
Storage Media
28. zombie
wordwrap
Storage Device
CMOS
compromised computer
29. Allows the processor to communicate with peripherals.
UNIX
expansion bus
payload
heat sink
30. Text version of an IP address
Denial of Service attack
Web Server
Domain name
telemedicine
31. Major carriers of network traffic
Information system
microbrowser
Internet Backbone
multifunction peripheral
32. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
image processing
virus
Web Application
Servers
33. Circuit boards tjay provide connections and functions not built into the motherboard
ASCII
adapter cards
chasis...
Laser printer
34. Consumer consumer e commerce.
online auction
fiber optic cable
CPU
digital
35. Short for key generator creats software registration numbers and sometimes activation codes.
IrDA Port
keygen
ALU
Input
36. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
unauthorized access
embedded computer
proxy server
cloud storage
37. Sends digital data and info from a comp to a DSL line
volatile memory
DSL modem
802.11
Hot spots
38. A system that attempts to imitate the behavior of a human brain.
SIMM
motherboard
NAS
neural network
39. Determines the number of bits that can be transmitted at one time
embedded operating system
bus width
virus signature
firmware...
40. Copyrighted software provided at no cost by company that retains all rights to software
Communications device
web filter
keygen
freeware...
41. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
system clock
sound card
Storage Device
bus
42. Perpetrator attempts to obtain your personal or financial info.
phishing
business software...
TLS
Linux
43. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
overvoltage
MRAM
business software...
hot plugging
44. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
system software...
spyware
project management software...
site license
45. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
DTP
jewel box
CERT/CC
trackball
46. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
RAID
USB hub
W3C
EFT
47. Communications activity. Handled by NSFnet.
disk cleanup
EULA
traffic
chip
48. Cables - telephone lines - radio networks - satellites
embedded operating system
SMTP
Transmission media
multi- core processor
49. On software is infinitie space and depth for VR
turnaround document
registrar
thread
VR world
50. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
ergonomics
VR world
UNIX
cable modem