SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
access time
worm
communications channel
ethernet
2. Device with a monitor - keyboard - and memory
UNIX
Terminal
Dial- up access
802.11
3. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
bus
spooling
Content Aggregator
IM
4. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
nonvolatile memory
keygen
TCP/IP
communications channel
5. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
LAN
POST
warm boot
IP address
6. Short for key generator creats software registration numbers and sometimes activation codes.
keygen
integrated circuit
project management software...
cloud storage
7. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
memory module
USB hub
RIMM
botnets
8. The technology of authenticating a persons identity by verifying a personal characteristic.
network
Drive Bay
adapter cards
biometrics
9. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
rootkit
Operating system
bus
pixel
10. Operating system on mobile devices that generally resides on ROM
CAPTCHA
TLS
embedded operating system
power supply
11. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
node
platter
Firewall
memory slots
12. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
web filter
broadband internet service
pixel
hypertext
13. Computing device small enough to hold in your hand
Mobile Device
Fiber to the Premises
RIMM
parallel processing
14. Is a security measure that defines who can access it and what actions they can take while acessing the computer
RAID
access control
neural network
chip
15. Can connect multiple types of devices that require faster data transmission speeds.
FireWire port
hot spot
liquid flow technology
public- domain software...
16. Errors that can be recognized by automatic update
pretty good Privacy
bugs
MAN
communications
17. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
access time
EULA
air mouse
Mainframe
18. Reorganizing it so that the files are store in continous sectors
network card
telemedicine
digital certificate
defragmenting
19. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
Input
Web Browser
hacker
cyberextortionist
20. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
cross - platform
L1 cache
script kiddie
Communications device
21. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
system software...
RAID
utility program
registrar
22. Single chip with two or more processor cores.
node
multi- core processor
player
wordwrap
23. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
data collection device
player
pixel
spyware
24. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
Personal Computers
product activation
adware
RTLS
25. All computers connected to central device. Hub or switch
mpeg
unethical employees
chat client
star network
26. On the motherboard hold memory modules
USB port
network
Latency
memory slots
27. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
DTP
DSL
DVI
cyberextortionist
28. Transmission media on which the data - instructions - information travel.
System Unit
optical reader
communications channel
hypertext
29. Fetching - decoding - executing - storing
Memory
access control
SRAM
machine cycle
30. Human speech is bc of its continous signal that vary in strength and quality
hard disk
DSL
database
analog
31. Dual inline memory module forms two sets of contact
embedded computer
DIMM
Plug and Play
DVI
32. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
CPU
macros
Trojan Horse
hot plugging
33. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
spider
terminal
cold boot
bus width
34. Loses its contents when power is turned off (RAM)
superscalar
TCP/IP
volatile memory
hash
35. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
wireless modem
network topology
script kiddie
Storage Device
36. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
pointing stick
access time
VR world
newsreader
37. The number of bytes a storage medium can hold
capacity
Memory Cache
sending device
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
38. Holds one or more disk drives
drive bay
sending device
CU
product activation
39. Privately owned and limited to a specific vendor or computer model.
MAN
wireless access point
proprietary software...
File compression utility
40. Enahnces the sound generating capabilites of a personal computer
Web Browser
sound card
liquid flow technology
fault tolerant computer
41. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
transistor
utility programs
compromised computer
Linux
42. Read only memory refers to memory chips storing permanent data and instructions (firmware)
PIM
Processor
ROM
OSP
43. Uses devices that emit and sense light to detect the mouses movement
Domain name system
Mobile Computer
optical mouse
DSL
44. Provids mobile users with a secure connection to the company server as if the user has a private line.
data collection device
broadband
virtual provate network
cluster
45. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
pointing stick
NAS
disk controller
Memory
46. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
cracker
Fiber to the Premises
sound card
network architecture
47. One or more computers on the network request services from the server. 10 or more computers
superscalar
router
chip
client/server
48. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
DRAM
fiber optic cable
disk cleanup
device dependant
49. ...
CAM
touchpad
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
streaming
50. Links in text based documents
USB port
plaintext
hypertext
File compression utility
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests