SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
stylus
Notebook Computer
e- learning
System Software...
2. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
embedded operating system
ergonomics
memory slots
audit trail
3. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
ghosting
MMS
supercomputer
coaxial cable
4. Used to track and identify the location of high risk or high value items.
RTLS
DLP projector
sending device
Trojan Horse
5. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
CAM
ALU
plaintext
DVI
6. A vulnerable computer that is set up to entice an intruder to break into it.
hot plugging
Software...
honeypot
SMTP
7. Special software to listen to audio
token ring
keygen
player
chat client
8. Optical mark recognition reads hand drawn marks such as circles or rectangles.
EDI
bit
OMR
synthesizer
9. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
shareware...
trackball
address
business software...
10. Health care professions conduct live conferences on the computer
telemedicine
DVI
embedded operating system
digital forensics
11. Encrypted data
CAPTCHA
ciphertext
project management software...
jewel box
12. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
power supply
wireless modem
Personal Computers
bandwidth
13. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
embedded computer
hot spot
virus signature
cyberterrorist
14. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
Drive Bay
PIM
server
utility program
15. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
Software...
Input
traffic
EDI
16. Someone who uses internet to destroy or damage computers for political reasons.
VR world
data collection device
cyberterrorist
MICR
17. The standard that outlines characteristics of how two network devices communicate
biometrics
Content Aggregator
Dedicated line
protocol
18. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
SRAM
disk cleanup
VR world
hacker
19. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
E- retail
IM
Personal Computers
access time
20. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
Storage Device
unethical employees
ISP
Web Browser
21. ...
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
Drive Bay
ethernet
tactile output
22. Organization that sells and manages domain names
communications
FireWire port
CAD
registrar
23. A window that provides info - presents availabe options - or requests a response.
ergonomics
dialog box
corporate spies
message board
24. A unique number that identifies the location of a byte in memory
application software...
W3C
transistor
address
25. They consist entirely of electronic components and contain no moving parts.
supercomputer
solid state media
wireless Internet service provider
touchpad
26. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
sound card
utility program
memory module
cyberterrorist
27. All computers connected to central device. Hub or switch
MRAM
star network
bit
ethernet
28. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
Storage Media
Software...
document management software...
download
29. Allows a user to plan schedule and track costs of a project
Output
project management software...
optical disc
twisted pair cable
30. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
spooling
W3C
DNS Server
overvoltage
31. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
proxy server
TCP/IP
utility programs
plaintext
32. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
RTLS
L1 cache
Intrusion detection software...
wordwrap
33. Perpetrator attempts to obtain your personal or financial info.
e- learning
phishing
access time
hard disk
34. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
air mouse
BIOS
network license
telesurgery
35. A temporary connection that uses one or more analog telphone lines for communications.
router
Dial Up line
broadband
Terminal
36. Contain permanently writeen data - instructions - and information
Home user
connector
firmware...
network standard
37. Random access memory- memory chips that can be read from and written to by the processor and other devices
RAM
solid state media
wireless Internet service provider
turnaround document
38. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
video card
digital forensics
utility program
router
39. CA resposible for giving out digital certificate
video card
overvoltage
system clock
certificate authority
40. Power on self test to check the various system components and the results are compared with data in a CMOS chip
WAN
POST
virtual provate network
DTP
41. Data that has been processed in a useful form- text - graphics - audio - video
digital
payload
density
Output
42. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
noise
connector
spoofing
application software...
43. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
VAN
jack
fault tolerant computer
wireless Internet service provider
44. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
network architecture
cross - platform
VAN
dot matrix printer
45. Does not require a newsreader - easier to use than a newsgroup
public- domain software...
network standard
capacity
message board
46. The discovery - collection adn analysis of evidence found on computers and networks
Denial of Service attack
digital forensics
traffic
Software...
47. A set of programs that coordinates all of the activies among computer hardware devices.
expansion bus
utility programs
jewel box
Operating system
48. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
project management software...
Content Aggregator
IrDA Port
spoofing
49. Electrical supply drops.can cause data loss but generally not cause equipment damage
cloud storage
dialog box
undervoltage
register
50. Is a security measure that defines who can access it and what actions they can take while acessing the computer
access control
Personal Computers
defragmenting
virus signature