SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Allows users to keep typing without using enter at the end of each line
twisted pair cable
wordwrap
mpeg
TLS
2. A program that restricts access to certain material on the web
system unit
traffic
star network
web filter
3. Software that helps groups of people work together on projects and share info over a network
warm boot
groupware...
Output
system bus
4. The code of acceptable behaviors users should follow while on the internet.
CAPTCHA
Domain name
Netiquette
noise
5. Used to gain competitive advantage
WAN
SMTP
corporate spies
USB port
6. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
DNS Server
stored program concept
Storage Media
OCR
7. Designed for mobile devices
System Software...
utility program
microbrowser
Terminal
8. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
chat client
disk controller
DTP
E- commerce
9. All computers connected to central device. Hub or switch
groupware...
star network
RFID
compromised computer
10. Uses fiber optic cable for internet connection.
device dependant
Fiber to the Premises
preemptive multitasking
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
11. An electrical disturbance that can degrade communications
power supply
Operating system
noise
router
12. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
VAN
macros
wireless access point
virtual provate network
13. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
spider
product activation
thread
air mouse
14. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
product activation
botnets
bus
RAM
15. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
Bay
gender changer
parallel processing
overvoltage
16. Major carriers of network traffic
VR
digital signature
Internet Backbone
preemptive multitasking
17. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
wordwrap
Processor
newsreader
compromised computer
18. Needed generally to participate in a newsgroup
preemptive multitasking
memory slots
product activation
newsreader
19. Federally funded internet security research and development center
virus
ARPA
disk cleanup
CERT/CC
20. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
CU
rootkit
newsreader
back door
21. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
BIOS
defragmenting
chip
802.11
22. Saves any open documents and programs to RAM and places computer into a low power state
IM
overvoltage
sleep mode
SIMM
23. Acts as an electronic switch that opens or closes the circuit for electrical charges
player
volatile memory
transistor
Drive Bay
24. Personal information manager is application software that includes features to help users organize personal info
PIM
FireWire port
utility program
online security service
25. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
player
ROM
fiber optic cable
adapter cards
26. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
VR
access time
terminal
EULA
27. A type of always on connection that is established between two communications devices. better than dial up line
File compression utility
adware
digital certificate
Dedicated line
28. World wide web consortium oversees research and sets standards for many areas of the internet
Top level domain
kernal
W3C
ROM
29. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
broadband
Top level domain
density
document management software...
30. Perpetrator attempts to obtain your personal or financial info.
E- commerce
disk controller
software suite
phishing
31. Screen savors were made to prevent this - which etched images permanently onto the screen
bus width
gender changer
system software...
ghosting
32. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
worm
TLS
botnets
cable modem
33. Controls timing of all computer operations
adapter cards
CERT/CC
system clock
expansion bus
34. Storage over an internet service
network
honeypot
integrated circuit
cloud storage
35. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
Plug and Play
system on a chip
twisted pair cable
parallel processing
36. Optical mark recognition reads hand drawn marks such as circles or rectangles.
OMR
network
Content Aggregator
DSL modem
37. Communications activity. Handled by NSFnet.
plug- in
cyberterrorist
jewel box
traffic
38. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
chasis...
W3C
machine cycle
utility programs
39. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
SMTP
virus
cyberextortionist
digital
40. Msot retail stores use POS to record purchases - process cards - and update inventory
peer to peer network
hash
Point of Sale terminals
capacity
41. Obtains data directly at the location where the transaction or event takes place.
Content Aggregator
data collection device
DSL
buffer
42. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
Point of Sale terminals
expansion bus
trackball
USB hub
43. Errors that can be recognized by automatic update
thread
bugs
POST
defragmenting
44. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
adapter cards
hypermedia
Web Application
Internet Backbone
45. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
ethernet
port
optical disc
ergonomics
46. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
hash
mpeg
ASCII
ergonomics
47. Uses radio waves to transmit data between two devices.
device dependant
Bluetooth
ring network
buffer
48. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
TLS
pretty good Privacy
shareware...
application software...
49. Is an online area in which isers have wrtten discussions about a particular subject.
MRAM
newsgroup
optical mouse
Laser printer
50. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
macros
PNG
MMS
trackball
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests