SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Is an online area in which isers have wrtten discussions about a particular subject.
CAD
server
image processing
newsgroup
2. The last section of the domain name
density
Top level domain
multi- core processor
chat client
3. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
EFT
GUI
fiber optic cable
Netiquette
4. Allows users to keep typing without using enter at the end of each line
image processing
Application software...
wordwrap
biometrics
5. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
GUI
expansion bus
nonvolatile memory
MAN
6. Processor begins to fetch a second instruction before it completes the full machine cycle
pipelining
ARPA
jewel box
script kiddie
7. Picure messaging can occur from mobile to mobile and mobile to email
MMS
utility program
Web conference
hypermedia
8. A type of storage media that consists of flat disc and is written and read by a laser
power supply
CAD
PNG
optical disc
9. A notcie that guarantees a user or web site is legit. E- commerce use it often
capacity
star network
Domain name system
digital certificate
10. Records in a file both successful and unsuccessful attempts.
PIM
embedded computer
audit trail
product activation
11. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
Firewall
network card
OMR
IM
12. Transmission media on which the data - instructions - information travel.
multi- core processor
USB hub
communications channel
MRAM
13. Smallest element in an electronic image
superscalar
pixel
thread
system clock
14. Protective case for optical discs
jewel box
digital forensics
port
air mouse
15. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
Latency
kernal
Terminal
bus network
16. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
Storage Device
spyware
hot spot
System Unit
17. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
back door
streaming
parallel processing
digital certificate
18. Other computers and mobile devices on the networ that rely on the server for its resources
platter
multifunction peripheral
client
broadband
19. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
Home user
Operating system
embedded computer
RFID
20. A window that provides info - presents availabe options - or requests a response.
cyberextortionist
dialog box
coaxial cable
Notebook Computer
21. Hides within or looks like a legitimate program such as a screen saver
CAD
virtual provate network
Trojan Horse
honeypot
22. Electrical supply drops.can cause data loss but generally not cause equipment damage
heat sink
overvoltage
Trojan Horse
undervoltage
23. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
liquid flow technology
client
nonvolatile memory
adware
24. A program that hides in a computer and allows someone from a remote location to take control of the computer
tactile output
Notebook Computer
protocol
rootkit
25. Enahnces the sound generating capabilites of a personal computer
PIM
turnaround document
Domain name
sound card
26. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
System Software...
W3C
hash
wordwrap
27. Copyrighted software provided at no cost by company that retains all rights to software
network
undervoltage
product activation
freeware...
28. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
DSL modem
backside bus
CU
pipelining
29. Surgeon performs operation by controlling robot when not in the same area as patient.
telesurgery
bit
bus width
EDI
30. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
spoofing
stylus
Storage Device
power supply
31. Uses devices that emit and sense light to detect the mouses movement
message board
download
coaxial cable
optical mouse
32. A web application that combines services from two or more sources creating a new application.
Netiquette
mashup
hard disk
noise
33. A personal computer you can carry from place to place
disk fragmenter
broadband internet service
Information system
Mobile Computer
34. Contains 10 or fewer comps - with similar reponsibilities and capabilities
air mouse
peer to peer network
L2 cache
Noise
35. Errors that can be recognized by automatic update
Personal Computers
crimeware
DIMM
bugs
36. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
pixel
Desktop Computer
Laser printer
player
37. A case that contains electronic components of the computer used to process data.
OSP
system unit
traffic
pipelining
38. Msot retail stores use POS to record purchases - process cards - and update inventory
Point of Sale terminals
Noise
ergonomics
E- retail
39. A collection of data organized in a manner that allows access retrieval and use of that data
database
ARPA
virus signature
embedded computer
40. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
register
solid state drive
phishing
overvoltage
41. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
access time
commands
utility program
hypertext
42. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
PIM
EDI
disk controller
proprietary software...
43. Reorganizing it so that the files are store in continous sectors
byte
thread
liquid flow technology
defragmenting
44. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
Netbook
video card
ring network
message board
45. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
Desktop Computer
USB port
RSS 2.0
broadband internet service
46. Integrates the functions of a processor - memory and a video card on a single chip.
system on a chip
VR world
dot matrix printer
telemedicine
47. Any data or instructions entered into the memory of the computer
communications channel
Input
machine cycle
Memory Cache
48. Communications activity. Handled by NSFnet.
rootkit
Plug and Play
traffic
Content Aggregator
49. Case of the system unit to protect internal damage
connector
chasis...
communications
spider
50. Hypertext transfer protocol
http
802.11
capacity
recieving device