SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software used by criminals
Content Aggregator
crimeware
virus signature
broadband
2. Personal information manager is application software that includes features to help users organize personal info
GPU
coaxial cable
touchpad
PIM
3. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
DTP
CMOS
GUI
access control
4. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
IM
commands
transistor
DNS Server
5. Holds one or more disk drives
drive bay
wireless access point
volatile memory
system clock
6. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
CAM
pipelining
online security service
solid state drive
7. Initiates an instruction to transmit data - instructions - or information.
solid state media
sending device
GPU
pixel
8. Controls timing of all computer operations
system clock
hypertext
Storage Device
application software...
9. Single inline memory module forms a single set of contacts
communications
cable modem
SIMM
Motherboard
10. Circuit boards tjay provide connections and functions not built into the motherboard
adapter cards
network
payload
optical reader
11. An electrical disturbance that can degrade communications
CAPTCHA
noise
disk cleanup
hypertext
12. Copyrighted software that is distributed at no cost for a trial period
RFID
shareware...
PIM
online auction
13. Loses its contents when power is turned off (RAM)
volatile memory
Desktop Computer
digital signature
wordwrap
14. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
CU
virus signature
scanner
USB hub
15. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
SRAM
EULA
IM
Application software...
16. Consumer consumer e commerce.
online auction
VR
network standard
digital modem
17. Sends digital data and info from a comp to a DSL line
drive bay
jack
Internet Backbone
DSL modem
18. Records in a file both successful and unsuccessful attempts.
utility programs
audit trail
bus
utility program
19. The fastest most powerful computer
supercomputer
System Software...
analog
MAN
20. A notcie that guarantees a user or web site is legit. E- commerce use it often
digital certificate
Hot spots
FireWire port
Point of Sale terminals
21. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
crimeware
spyware
ISP
UNIX
22. Communications activity. Handled by NSFnet.
software suite
plug- in
traffic
Linux
23. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
Personal Computers
terminal
pixel
access time
24. Allows a user to plan schedule and track costs of a project
BIOS
Application software...
POST
project management software...
25. A system that attempts to imitate the behavior of a human brain.
ALU
cloud storage
volatile memory
neural network
26. Enahnces the sound generating capabilites of a personal computer
macros
sound card
ISP
capacity
27. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
E- commerce
DTP
network topology
audit trail
28. Provides the user with a physcial response from the device
macros
thread
trackball
tactile output
29. A collection of data organized in a manner that allows access retrieval and use of that data
stylus
database
dialog box
System Software...
30. Two main parts are processor and memory.
Motherboard
system software...
worm
digital
31. Connects the processor to cache.
Software...
jewel box
backside bus
Notebook Computer
32. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
multifunction peripheral
Web Browser
DIMM
Mobile Computer
33. Is an online area in which isers have wrtten discussions about a particular subject.
downloading
pipelining
newsgroup
wireless Internet service provider
34. The discovery - collection adn analysis of evidence found on computers and networks
System Unit
digital forensics
CU
IP address
35. A program that hides in a computer and allows someone from a remote location to take control of the computer
rootkit
VoIP
adware
Fiber to the Premises
36. Computer automatically can configure adapter cards and other peripherals as you install them
server
unethical employees
Plug and Play
ALU
37. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
access time
access control
ethernet
message board
38. The code of acceptable behaviors users should follow while on the internet.
hot plugging
Netiquette
crimeware
MRAM
39. An instruction that causes a program to perform a specific action.
Transmission media
download
commands
USB hub
40. Human speech is bc of its continous signal that vary in strength and quality
utility programs
analog
traffic
kernal
41. Single chip with two or more processor cores.
Drive Bay
access time
multi- core processor
ghosting
42. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
hot spot
IM
image processing
access time
43. The original article and all subsequent related replies
thread
cyberterrorist
Input
IrDA Port
44. Reorganizing it so that the files are store in continous sectors
backside bus
defragmenting
Dial Up line
System Unit
45. Someone who uses internet to destroy or damage computers for political reasons.
TLS
hard disk
Terminal
cyberterrorist
46. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
hot plugging
hash
jack
network
47. Builds and maintains lists of words found on websites. Useful for search engines
system clock
CU
superscalar
spider
48. A know specific pattern of virus code.
hot spot
virus signature
noise
player
49. Software that helps groups of people work together on projects and share info over a network
groupware...
Firewall
Web conference
DLP projector
50. Pressure sensitive eraser shaped pointing device
pointing stick
DIMM
optical mouse
business software...