SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Sends digital data and info from a comp to a DSL line
DSL modem
memory module
solid state media
buffer
2. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
botnets
supercomputer
nonvolatile memory
project management software...
3. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
solid state drive
Fiber to the Premises
business software...
Personal Computers
4. An electrical disturbance that can degrade communications
noise
network standard
cross - platform
stylus
5. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
bugs
client/server
virus
newsreader
6. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
online security service
cloud storage
chip
document management software...
7. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
program
gender changer
IM
Mobile Device
8. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
VAN
wireless access point
driver
recieving device
9. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
System Unit
chat client
pixel
Netiquette
10. Small program that tells the operating system how to communicate with a specific device
Mainframe
star network
driver
Dial- up access
11. An instruction that causes a program to perform a specific action.
nonvolatile memory
commands
bugs
proxy server
12. Smallest element in an electronic image
turnaround document
pixel
Drive Bay
hypertext
13. CA resposible for giving out digital certificate
EULA
CPU
animated Gif...
certificate authority
14. Random access memory- memory chips that can be read from and written to by the processor and other devices
client/server
broadband
RAM
Drive Bay
15. Can be peropheral or chip - creates sound from digital instructions.
unethical employees
synthesizer
IrDA Port
macros
16. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
Dial up modems
Laser printer
DTP
biometrics
17. Communications activity. Handled by NSFnet.
traffic
program
device dependant
commands
18. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
Firewall
player
RAID
Home user
19. Loses its contents when power is turned off (RAM)
ghosting
volatile memory
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
document management software...
20. Graphics processing unit controls the manipulation and display of graphics on the display device.
CAPTCHA
GPU
expansion slot
noise
21. The use of computer or network with out permission
L2 cache
unauthorized access
hash
server
22. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
UNIX
density
heat pipe
OCR
23. Dish shaped antenna for internet connection
fixed wireless
http
Memory
optical mouse
24. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
coaxial cable
peer to peer network
expansion slot
parallel processing
25. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
worm
cracker
E- commerce
Point of Sale terminals
26. A legal agreement that permits users to install the software on multiple computers.
site license
Plug and Play
superscalar
MICR
27. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
hot spot
Memory Cache
VR world
cold boot
28. Builds and maintains lists of words found on websites. Useful for search engines
telemedicine
kernal
spider
drive bay
29. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
air mouse
ciphertext
Operating system
newsreader
30. A colection of individual programs available together as a unit. lower cost and ease of use
W3C
network
software suite
nonvolatile memory
31. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
product activation
machine cycle
overvoltage
DVI
32. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
chat client
product activation
platter
Linux
33. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
download
optical reader
freeware...
image processing
34. Searches for and removes unneccessary files
disk fragmenter
heat sink
disk cleanup
bus
35. Hardware - software - data - people - procedures
buffer
MICR
multi- core processor
Information system
36. Latest version of Post office Protocol
biometrics
pipelining
Operating system
POP3
37. Copyrighted software that is distributed at no cost for a trial period
shareware...
cable modem
adapter cards
turnaround document
38. A personal computer you can carry from place to place
hot spot
warm boot
Mobile Computer
Memory
39. Controls timing of all computer operations
system clock
Dedicated line
streaming
Bay
40. Company that provides wireless internet access to computers
Netbook
system unit
server
wireless Internet service provider
41. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
compromised computer
cold boot
access time
ergonomics
42. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
adware
microbrowser
UNIX
EULA
43. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
IM
DIMM
buffer
data collection device
44. When online meetings take place on the web
stored program concept
Web conference
Terminal
bus network
45. Used to gain competitive advantage
Storage Device
turnaround document
corporate spies
TCP/IP
46. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
freeware...
site license
wireless access point
DVI
47. Single chip with two or more processor cores.
star network
multi- core processor
product activation
honeypot
48. Electrical supply drops.can cause data loss but generally not cause equipment damage
undervoltage
CAD
neural network
Internet Backbone
49. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
DTP
OMR
WAN
software suite
50. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
botnets
RIMM
heat sink
preemptive multitasking