SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
RAM
DSL
System Software...
parallel processing
2. Someone who accesses a computer or network illegally. Some say they hack to improve security
GPU
hacker
network topology
RFID
3. The number of bits in an area on a storage medium - Higher density means more storage capacity
density
expansion slot
transistor
terminal
4. Hardware - software - data - people - procedures
token ring
Information system
SRAM
MAN
5. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
W3C
FireWire port
PNG
VR
6. Software that helps groups of people work together on projects and share info over a network
VR world
groupware...
Web conference
Latency
7. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
USB hub
Storage Device
noise
Memory
8. Needed generally to participate in a newsgroup
VoIP
phishing
newsreader
USB hub
9. Text version of an IP address
Domain name
corporate spies
wireless access point
product activation
10. The amount of data - instructions - and information that can travel over communications channel
Servers
CAD
bandwidth
virtual provate network
11. When turning on a computer that has been turned off completly
player
network architecture
digital forensics
cold boot
12. An electrical disturbance that can degrade communications
turnaround document
noise
fiber optic cable
Servers
13. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
transistor
CU
web filter
application software...
14. Smallest unit of data the computer can process
bit
access time
System Unit
Web conference
15. A web application that combines services from two or more sources creating a new application.
mashup
buffer
nonvolatile memory
virtual provate network
16. Provids mobile users with a secure connection to the company server as if the user has a private line.
streaming cam
virtual provate network
IP address
UNIX
17. Graphic file (JPEG - GIF) slowly replacing GIF
OSP
volatile memory
cluster
PNG
18. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
WAN
spider
Memory
virus
19. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
L2 cache
VR
multifunction peripheral
Servers
20. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
expansion slot
cross - platform
trackball
cyberextortionist
21. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
air mouse
tactile output
Intrusion detection software...
wireless modem
22. Joins a cable and a port
network
nonvolatile memory
Terminal
connector
23. Special software to listen to audio
OMR
player
analog
software suite
24. Local area network- network tat connects computers and devices in a limited geographical area such as a home
ARPA
capacity
Web Server
LAN
25. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
ergonomics
Point of Sale terminals
RFID
freeware...
26. Loses its contents when power is turned off (RAM)
volatile memory
fixed wireless
multifunction peripheral
supercomputer
27. A program that hides in a computer and allows someone from a remote location to take control of the computer
wireless access point
DIMM
compromised computer
rootkit
28. Any unwanted signal usually varying quickly
multi- core processor
Bluetooth
Memory
Noise
29. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
Home user
Point of Sale terminals
rootkit
power supply
30. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
Storage Media
Web Application
scanner
dot matrix printer
31. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
DSL
Operating system
Communications device
certificate authority
32. Provides the user with a physcial response from the device
online auction
product activation
tactile output
video card
33. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
Memory Cache
fixed wireless
virtual provate network
wireless modem
34. A small flat rectangular pointing device that is sensitive to pressure and motion.
TCP/IP
Software...
power supply
touchpad
35. Moving pictures experts group is a popular video compression standard
optical reader
thread
mpeg
CERT/CC
36. Smallest element in an electronic image
DSL
pixel
integrated circuit
OSP
37. A family member on a computer
SMTP
Home user
Dedicated line
Application software...
38. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
download
buffer
DVI
SRAM
39. Uses radio waves to transmit data between two devices.
Bluetooth
multifunction peripheral
USB hub
microbrowser
40. Graphics processing unit controls the manipulation and display of graphics on the display device.
Plug and Play
script kiddie
air mouse
GPU
41. The number of bytes a storage medium can hold
Application software...
Content Aggregator
synthesizer
capacity
42. Enahnces the sound generating capabilites of a personal computer
router
PIM
sound card
network topology
43. Type of notebook comp that is smaller and less powerful than a normal notebook comp
Storage Media
Netbook
Intrusion detection software...
system software...
44. Digital light processor uses tiny mirrors to reflect light
DLP projector
Memory Cache
scanner
network topology
45. Perpetrator attempts to obtain your personal or financial info.
kernal
phishing
MRAM
air mouse
46. Errors that can be recognized by automatic update
token ring
recieving device
bugs
power supply
47. A system that attempts to imitate the behavior of a human brain.
EFT
spider
neural network
firmware...
48. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
ghosting
Linux
power supply
document management software...
49. Operating system on mobile devices that generally resides on ROM
embedded operating system
utility program
formatting
Home user
50. Uses fiber optic cable for internet connection.
digital forensics
player
Fiber to the Premises
GPU