SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Two or more computers transfer data - instructions - and information.
transistor
trackball
communications
optical reader
2. PGP an encryption program
Notebook Computer
streaming
buffer
pretty good Privacy
3. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
disk cleanup
Top level domain
online auction
TLS
4. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
animated Gif...
IrDA Port
kernal
CAPTCHA
5. Special software to listen to audio
player
unauthorized access
newsreader
peripheral
6. A collection of data organized in a manner that allows access retrieval and use of that data
Netbook
buffer
database
RTLS
7. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
network standard
802.11
trackball
digital certificate
8. Uses fiber optic cable for internet connection.
pixel
multifunction peripheral
cable modem
Fiber to the Premises
9. A server that you connect to to start a chat session.
Dial up modems
chat client
DVI
bit
10. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
access time
DVI
warm boot
bus width
11. Enahnces the sound generating capabilites of a personal computer
Mobile Device
Domain name system
sound card
player
12. A document that you return to the company that creates and sends it.
business software...
streaming
telemedicine
turnaround document
13. A type of system software that allows users to perform maintenence type tasks
utility program
http
Mobile Device
hibernate
14. Needed generally to participate in a newsgroup
transistor
unauthorized access
newsreader
microbrowser
15. Retains existing application software and data files even if you can change computer models or vendors
back door
integrated circuit
Mainframe
device independent
16. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
sleep mode
BIOS
cyberterrorist
document management software...
17. The code of acceptable behaviors users should follow while on the internet.
worm
ergonomics
DRAM
Netiquette
18. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
ALU
DVI
worm
embedded operating system
19. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
biometrics
peripheral
port
jack
20. Allows users to keep typing without using enter at the end of each line
wordwrap
client
byte
E- retail
21. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
CAM
embedded computer
Mainframe
platter
22. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
optical disc
terminal
fault tolerant computer
Laser printer
23. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
dot matrix printer
jewel box
RAID
product activation
24. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
client
site license
RFID
cloud storage
25. The design of computers - devices - and media in the network
network architecture
System Unit
hacker
power supply
26. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
CAPTCHA
access time
hot spot
VAN
27. Uses radio waves to transmit data between two devices.
Bluetooth
digital
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
WAN
28. The smallest unit of disk space that stores data and info
software suite
chasis...
proprietary software...
cluster
29. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
wordwrap
message board
System Unit
byte
30. Mathematical formula that generates a code from the contents of the message
hash
plug- in
Netbook
Dedicated line
31. World wide web consortium oversees research and sets standards for many areas of the internet
W3C
supercomputer
IrDA Port
wireless modem
32. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
MRAM
pointing stick
byte
MAN
33. Protective case for optical discs
solid state drive
payload
Dial- up access
jewel box
34. Someone who accesses a computer or network illegally. Some say they hack to improve security
hacker
pipelining
heat pipe
streaming cam
35. A special purpose computer that functions as a component in a larger product. Small with limited hardware
shareware...
embedded computer
LAN
network license
36. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
Memory
RAID
solid state drive
ethernet
37. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
disk fragmenter
pointing stick
payload
disk cleanup
38. Major carriers of network traffic
hash
multifunction peripheral
system software...
Internet Backbone
39. Health care professions conduct live conferences on the computer
telemedicine
CPU
traffic
online auction
40. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
Home user
business software...
utility programs
EFT
41. Obtains data directly at the location where the transaction or event takes place.
Communications device
data collection device
PNG
player
42. Extends the capabilites of a browser.
communications
Software...
plug- in
payload
43. A vulnerable computer that is set up to entice an intruder to break into it.
digital
cluster
honeypot
bus
44. Text version of an IP address
certificate authority
downloading
message board
Domain name
45. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
access time
VAN
hot spot
online security service
46. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
peripheral
message board
VoIP
access time
47. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
BIOS
E- commerce
embedded computer
NAS
48. Completely Automated Public Turing test to tell Computers and Humans Apart.
embedded operating system
CAPTCHA
DNS Server
EDI
49. A temporary connection that uses one or more analog telphone lines for communications.
bus
Communications device
EDI
Dial Up line
50. CA resposible for giving out digital certificate
optical mouse
certificate authority
network card
Mainframe