SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Donated for public use has no copyright restrictions
macros
GPU
public- domain software...
back door
2. Optical mark recognition reads hand drawn marks such as circles or rectangles.
Notebook Computer
DRAM
OMR
Dial- up access
3. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
fiber optic cable
bus width
video card
system on a chip
4. Uses fiber optic cable for internet connection.
byte
Fiber to the Premises
Dedicated line
software suite
5. (laptop computer) portable personal computer often able to fit in your lap
kernal
Notebook Computer
tactile output
cross - platform
6. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
noise
back door
ethernet
disk cleanup
7. The standard that outlines characteristics of how two network devices communicate
Desktop Computer
downloading
protocol
utility program
8. Smaller than heat sink cools processors in notebook comps
Firewall
Netbook
Intrusion detection software...
heat pipe
9. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
SRAM
groupware...
proxy server
network
10. The destructive event or prank the program intended to deliver
connector
unauthorized access
Personal Computers
payload
11. Program is one that runs the same on multiple operating systems
Drive Bay
machine cycle
cross - platform
wireless Internet service provider
12. Obtains data directly at the location where the transaction or event takes place.
Dial- up access
data collection device
sending device
ciphertext
13. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
OCR
byte
neural network
network standard
14. A legal agreement that permits users to install the software on multiple computers.
ring network
Dial up modems
site license
device dependant
15. Provides the user with a physcial response from the device
ALU
tactile output
digital certificate
drive bay
16. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
Home user
token ring
analog
compromised computer
17. Circuit boards tjay provide connections and functions not built into the motherboard
CAPTCHA
BIOS
adapter cards
chasis...
18. Latest version of Post office Protocol
Memory Cache
bus
POP3
Web Browser
19. Human speech is bc of its continous signal that vary in strength and quality
Laser printer
digital modem
analog
bit
20. Used to track and identify the location of high risk or high value items.
Content Aggregator
RTLS
back door
DTP
21. Small capacity built directly in the processor chip
recieving device
hypertext
L1 cache
WAN
22. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
L2 cache
disk fragmenter
wireless modem
web filter
23. Any data or instructions entered into the memory of the computer
Input
E- commerce
bus network
volatile memory
24. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
MRAM
Communications device
preemptive multitasking
unauthorized access
25. Does not require a newsreader - easier to use than a newsgroup
message board
Noise
System Software...
chip
26. Graphic file (JPEG - GIF) slowly replacing GIF
superscalar
MRAM
PNG
undervoltage
27. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
TCP/IP
scanner
crimeware
registrar
28. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
spoofing
Memory Cache
digital signature
phishing
29. A communications device that sends and recieves data and info to and from digital line
byte
digital modem
Linux
application software...
30. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
address
Storage Media
RAID
Netbook
31. On the motherboard hold memory modules
broadband
memory slots
crimeware
Domain name
32. Allows the processor to communicate with peripherals.
Web Application
expansion bus
crimeware
Bluetooth
33. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
undervoltage
Bluetooth
capacity
USB hub
34. The original article and all subsequent related replies
DRAM
crimeware
hard disk
thread
35. Consumer consumer e commerce.
freeware...
online auction
honeypot
mpeg
36. Retains existing application software and data files even if you can change computer models or vendors
device independent
router
animated Gif...
newsreader
37. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
formatting
message board
ergonomics
access time
38. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
NAS
biometrics
bus width
coaxial cable
39. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
optical mouse
terminal
spoofing
RFID
40. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
ISP
disk fragmenter
chasis...
WAN
41. The discovery - collection adn analysis of evidence found on computers and networks
virtual provate network
corporate spies
digital forensics
expansion bus
42. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
solid state media
business software...
TCP/IP
traffic
43. A collection of data organized in a manner that allows access retrieval and use of that data
Transmission media
SIMM
database
jewel box
44. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
hot spot
System Unit
WAN
cloud storage
45. A notcie that guarantees a user or web site is legit. E- commerce use it often
air mouse
keygen
digital certificate
FireWire port
46. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
Motherboard
disk fragmenter
cloud storage
device independent
47. Read only memory refers to memory chips storing permanent data and instructions (firmware)
VoIP
register
firmware...
ROM
48. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
network
tactile output
File compression utility
E- commerce
49. Msot retail stores use POS to record purchases - process cards - and update inventory
device independent
download
star network
Point of Sale terminals
50. The smallest unit of disk space that stores data and info
cluster
pretty good Privacy
trackball
IP address