SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A socket in the motherboard that can hold an adapter card
document management software...
expansion slot
shareware...
system unit
2. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
Noise
download
fault tolerant computer
motherboard
3. Device with a monitor - keyboard - and memory
Web conference
IP address
Terminal
Hot spots
4. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
network architecture
wireless access point
Intrusion detection software...
client/server
5. Graphics processing unit controls the manipulation and display of graphics on the display device.
Servers
GPU
IM
L1 cache
6. Digital light processor uses tiny mirrors to reflect light
DLP projector
liquid flow technology
LAN
script kiddie
7. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
wireless modem
register
spyware
CMOS
8. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
Dial up modems
proprietary software...
Denial of Service attack
e- learning
9. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
Desktop Computer
ghosting
expansion bus
router
10. Transmission media on which the data - instructions - information travel.
network architecture
IM
terminal
communications channel
11. Enahnces the sound generating capabilites of a personal computer
groupware...
sound card
power supply
device independent
12. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
fault tolerant computer
chip
VAN
digital
13. Media transmit multiple signals simutaneously. Download faster than upload
CAM
gender changer
broadband
streaming cam
14. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
driver
Drive Bay
program
L1 cache
15. Organization that sells and manages domain names
Dial- up access
firmware...
registrar
plaintext
16. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
PNG
Hot spots
embedded computer
USB hub
17. A notcie that guarantees a user or web site is legit. E- commerce use it often
Point of Sale terminals
IM
digital certificate
Top level domain
18. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
System Unit
rootkit
GPU
biometrics
19. Internet connections using regular copper telephone lines.
access control
jack
DSL
Operating system
20. Major carriers of network traffic
unethical employees
machine cycle
Internet Backbone
CAPTCHA
21. Copyrighted software that is distributed at no cost for a trial period
connector
recieving device
shareware...
digital forensics
22. The discovery - collection adn analysis of evidence found on computers and networks
mashup
address
Storage Device
digital forensics
23. Allows the processor to communicate with peripherals.
expansion bus
bandwidth
byte
L2 cache
24. Company that provides wireless internet access to computers
wireless Internet service provider
ASCII
Domain name
online security service
25. Method that the internet uses to store domain names and their corressponding IP addresses
GPU
NAS
plug- in
Domain name system
26. A number that uniquely identifies each computer or device connected to the internet (0-255)
sleep mode
coaxial cable
access control
IP address
27. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
telemedicine
adware
OCR
RFID
28. Someone who accesses a computer or network illegally. Some say they hack to improve security
hacker
OSP
access control
botnets
29. Short for key generator creats software registration numbers and sometimes activation codes.
keygen
expansion slot
digital signature
DSL
30. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
business software...
EFT
recieving device
commands
31. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
Domain name system
Memory
802.11
access control
32. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
digital
802.11
bus network
preemptive multitasking
33. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
DTP
digital certificate
POP3
TLS
34. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
unethical employees
hard disk
online security service
database
35. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
Netbook
optical reader
spyware
USB hub
36. An electrical disturbance that can degrade communications
noise
hard disk
device dependant
SRAM
37. Two or more computers transfer data - instructions - and information.
Content Aggregator
Notebook Computer
communications
utility programs
38. Computer aided design software assists a professional user in creating designs
gender changer
CAD
Dial Up line
spider
39. Does not require a newsreader - easier to use than a newsgroup
cracker
message board
ghosting
overvoltage
40. An instruction that causes a program to perform a specific action.
commands
cyberterrorist
Application software...
Content Aggregator
41. Dual inline memory module forms two sets of contact
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
DIMM
undervoltage
DSL
42. A collection of data organized in a manner that allows access retrieval and use of that data
corporate spies
VAN
integrated circuit
database
43. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
warm boot
Memory
ALU
undervoltage
44. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
BIOS
trackball
warm boot
Noise
45. On software is infinitie space and depth for VR
VR world
EULA
L1 cache
Fiber to the Premises
46. Optical mark recognition reads hand drawn marks such as circles or rectangles.
OMR
MRAM
back door
OSP
47. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
botnets
memory slots
downloading
network architecture
48. Controls timing of all computer operations
Dedicated line
EDI
newsreader
system clock
49. The original article and all subsequent related replies
thread
utility program
DSL
density
50. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
address
access time
biometrics
spider
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests