SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
disk cleanup
multi- core processor
utility program
DVI
2. A unique number that identifies the location of a byte in memory
address
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
overvoltage
wireless access point
3. Hypertext transfer protocol
database
http
bit
Intrusion detection software...
4. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
drive bay
Notebook Computer
NAS
disk fragmenter
5. Small capacity built directly in the processor chip
PNG
network
L1 cache
Fiber to the Premises
6. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
register
VAN
buffer
SMTP
7. Can connect multiple types of devices that require faster data transmission speeds.
FireWire port
liquid flow technology
Dedicated line
disk cleanup
8. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
preemptive multitasking
access time
Dedicated line
MAN
9. Small program that tells the operating system how to communicate with a specific device
bandwidth
RTLS
Trojan Horse
driver
10. Power on self test to check the various system components and the results are compared with data in a CMOS chip
POST
cross - platform
noise
sound card
11. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
virus
VoIP
BIOS
E- commerce
12. Read only memory refers to memory chips storing permanent data and instructions (firmware)
message board
ROM
fixed wireless
RIMM
13. Any data or instructions entered into the memory of the computer
Input
Terminal
biometrics
Web Application
14. A program that hides in a computer and allows someone from a remote location to take control of the computer
DSL modem
rootkit
TLS
Bay
15. The use of computer or network with out permission
tactile output
DSL
expansion bus
unauthorized access
16. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
solid state media
Linux
optical reader
pipelining
17. The standard that outlines characteristics of how two network devices communicate
commands
protocol
utility program
Application software...
18. Mathematical formula that generates a code from the contents of the message
hash
overvoltage
Memory
adware
19. Is a security measure that defines who can access it and what actions they can take while acessing the computer
OSP
access control
capacity
rootkit
20. Human speech is bc of its continous signal that vary in strength and quality
terminal
analog
microbrowser
network topology
21. Connects the processor to cache.
backside bus
communications channel
gender changer
wireless access point
22. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
CERT/CC
air mouse
RAM
connector
23. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
fault tolerant computer
backside bus
back door
File compression utility
24. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
Dial up modems
superscalar
utility programs
Hot spots
25. Single chip with two or more processor cores.
trackball
multi- core processor
preemptive multitasking
digital signature
26. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
Operating system
e- learning
connector
Processor
27. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
Noise
TCP/IP
coaxial cable
DSL
28. ...
Point of Sale terminals
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
player
ALU
29. Uses fiber optic cable for internet connection.
communications channel
client/server
platter
Fiber to the Premises
30. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
Web conference
wireless modem
Information system
Communications device
31. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
server
VR world
Memory Cache
access time
32. Internet Service Provider- a regional or national access provider
ISP
cloud storage
Denial of Service attack
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
33. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
Intrusion detection software...
Hot spots
system on a chip
34. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
trackball
Domain name system
Netbook
DVI
35. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
audit trail
expansion slot
power supply
Linux
36. Any unwanted signal usually varying quickly
Noise
honeypot
DNS Server
system on a chip
37. When turning on a computer that has been turned off completly
undervoltage
IM
cold boot
adapter cards
38. Graphics processing unit controls the manipulation and display of graphics on the display device.
CAM
system clock
honeypot
GPU
39. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
DIMM
wireless access point
USB port
client/server
40. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
disk cleanup
application software...
wireless access point
supercomputer
41. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
Terminal
backside bus
Web Browser
utility program
42. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
NAS
Firewall
software suite
business software...
43. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
UNIX
OSP
connector
backside bus
44. Software used by criminals
product activation
warm boot
crimeware
TCP/IP
45. A legal agreement that allows multiple users to access the software on the server simutaneously
cable modem
network license
digital forensics
cluster
46. Saves any open docs or programs to hardisk before removing power
application software...
hibernate
W3C
access time
47. Records in a file both successful and unsuccessful attempts.
pixel
crimeware
Dedicated line
audit trail
48. Designed for mobile devices
Content Aggregator
Fiber to the Premises
bus network
microbrowser
49. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
CU
warm boot
Mainframe
Domain name system
50. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
heat pipe
Netiquette
register
OSP