SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
worm
proprietary software...
touchpad
public- domain software...
2. Software that helps groups of people work together on projects and share info over a network
groupware...
document management software...
LAN
preemptive multitasking
3. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
network topology
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
liquid flow technology
network standard
4. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
undervoltage
broadband internet service
network standard
VR world
5. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
solid state media
server
utility program
communications
6. Dynamic ram- chips must be re energized constantly or they lose their contents.
GPU
bus network
DRAM
system bus
7. Integrates the functions of a processor - memory and a video card on a single chip.
Software...
system on a chip
Mainframe
ergonomics
8. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
solid state drive
DTP
embedded computer
bandwidth
9. Smaller than heat sink cools processors in notebook comps
heat pipe
optical mouse
broadband
NAS
10. Accepts the transmission of data - instructions - or info
embedded computer
access control
recieving device
coaxial cable
11. The last section of the domain name
Top level domain
CPU
ISP
cluster
12. Processor begins to fetch a second instruction before it completes the full machine cycle
pipelining
MMS
http
TCP/IP
13. Mathematical formula that generates a code from the contents of the message
Laser printer
hash
optical mouse
synthesizer
14. Random access memory- memory chips that can be read from and written to by the processor and other devices
Content Aggregator
wireless Internet service provider
RAM
System Unit
15. The use of computer or network with out permission
unauthorized access
cyberextortionist
Terminal
drive bay
16. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
cracker
hot plugging
Dial- up access
undervoltage
17. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
air mouse
heat sink
streaming
Servers
18. Federally funded internet security research and development center
database
utility programs
commands
CERT/CC
19. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
preemptive multitasking
access time
Mainframe
terminal
20. Privately owned and limited to a specific vendor or computer model.
proprietary software...
cyberterrorist
client
CERT/CC
21. Rambus inline memory module house RDRAM chips
RIMM
DIMM
Dedicated line
system bus
22. Needed generally to participate in a newsgroup
ALU
newsreader
kernal
PIM
23. One or more computers on the network request services from the server. 10 or more computers
Input
virus
client/server
MMS
24. Popular for LAN. single central cable.
CERT/CC
bus network
audit trail
Intrusion detection software...
25. Does not require a newsreader - easier to use than a newsgroup
message board
chasis...
Memory Cache
payload
26. Case of the system unit to protect internal damage
disk controller
wireless Internet service provider
chasis...
OSP
27. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
optical reader
digital modem
IM
SRAM
28. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
DNS Server
pipelining
IM
Netiquette
29. On the motherboard hold memory modules
Mainframe
online auction
data collection device
memory slots
30. A device that enables you to join a port and a connector that are both male or female
gender changer
capacity
WAN
Domain name
31. Someone who accesses a computer or network illegally. Some say they hack to improve security
client
hacker
utility program
bus network
32. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
DIMM
Web Browser
fiber optic cable
utility programs
33. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
integrated circuit
http
USB hub
cluster
34. Contain permanently writeen data - instructions - and information
mpeg
GUI
preemptive multitasking
firmware...
35. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
Intrusion detection software...
Hot spots
System Unit
undervoltage
36. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
wireless access point
Communications device
utility program
document management software...
37. A program that restricts access to certain material on the web
rootkit
web filter
DSL
payload
38. The design of computers - devices - and media in the network
Operating system
adapter cards
nonvolatile memory
network architecture
39. Copyrighted software that is distributed at no cost for a trial period
embedded computer
shareware...
integrated circuit
pretty good Privacy
40. A computer that delivers requested web pages to your computer
expansion bus
Personal Computers
Web Server
newsgroup
41. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
unauthorized access
warm boot
GPU
L1 cache
42. Latest version of Post office Protocol
solid state drive
POP3
token ring
UNIX
43. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
streaming cam
newsgroup
driver
hypermedia
44. The delivery of education via some electronic method such as the internet - networks - or optical disks.
TCP/IP
dialog box
e- learning
download
45. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
video card
Dial- up access
Trojan Horse
POP3
46. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
peripheral
cyberextortionist
spyware
W3C
47. Broadband modem- sends and recives digital data over the cable television
DNS Server
CU
MRAM
cable modem
48. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
adware
router
touchpad
Linux
49. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
expansion bus
cracker
DSL
Dial Up line
50. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
script kiddie
disk fragmenter
buffer
terminal
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests