SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
EFT
undervoltage
business software...
USB hub
2. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
system bus
access time
chip
Mobile Device
3. Rambus inline memory module house RDRAM chips
RIMM
utility program
device independent
hacker
4. A type of system software that allows users to perform maintenence type tasks
http
touchpad
stylus
utility program
5. Program that euns only on a specific type or make of computer
mpeg
device dependant
wireless access point
Operating system
6. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
E- commerce
proxy server
Web Server
GUI
7. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
CAM
pipelining
spyware
analog
8. Provide Wi Fi to mobile computers or devices
device dependant
NAS
back door
Hot spots
9. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
Trojan Horse
DSL
hard disk
system bus
10. Screen savors were made to prevent this - which etched images permanently onto the screen
ciphertext
unauthorized access
ghosting
image processing
11. Processor begins to fetch a second instruction before it completes the full machine cycle
cluster
Hot spots
formatting
pipelining
12. Moving pictures experts group is a popular video compression standard
crimeware
Terminal
mpeg
RAM
13. Broadband modem- sends and recives digital data over the cable television
Mainframe
Web conference
cable modem
WAN
14. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
EDI
LAN
capacity
fault tolerant computer
15. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
MRAM
liquid flow technology
DSL
telesurgery
16. Circuit boards tjay provide connections and functions not built into the motherboard
chasis...
Desktop Computer
adapter cards
analog
17. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
System Software...
utility programs
bandwidth
access control
18. A real time internet communications service where you can talk to people online.
power supply
IM
Mainframe
sound card
19. Allows the processor to communicate with peripherals.
data collection device
macros
expansion bus
MRAM
20. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
access control
download
noise
DVI
21. Used to track and identify the location of high risk or high value items.
drive bay
preemptive multitasking
RTLS
L1 cache
22. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
E- retail
RSS 2.0
project management software...
Communications device
23. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
adware
streaming
TLS
trackball
24. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
downloading
compromised computer
multifunction peripheral
Desktop Computer
25. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
recieving device
Memory
OCR
26. Popular for LAN. single central cable.
Drive Bay
star network
bus network
back door
27. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
network
wireless access point
spider
Output
28. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
EFT
ASCII
client/server
capacity
29. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
worm
Drive Bay
UNIX
Hot spots
30. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
hot spot
peripheral
telesurgery
VAN
31. A special purpose computer that functions as a component in a larger product. Small with limited hardware
hot plugging
Terminal
trackball
embedded computer
32. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
client
Output
router
server
33. The technology of authenticating a persons identity by verifying a personal characteristic.
CAM
corporate spies
data collection device
biometrics
34. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
device dependant
VAN
CPU
byte
35. Power on self test to check the various system components and the results are compared with data in a CMOS chip
LAN
POST
Bluetooth
CMOS
36. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
virtual provate network
POP3
Software...
hot plugging
37. Needed generally to participate in a newsgroup
CPU
VoIP
DSL modem
newsreader
38. Determines the number of bits that can be transmitted at one time
bus width
client/server
EDI
cyberterrorist
39. Has the illusion of moving images becuase it sends a continuos stream of images
spooling
proxy server
bus width
streaming cam
40. Type of notebook comp that is smaller and less powerful than a normal notebook comp
Netbook
GPU
system software...
sound card
41. Donated for public use has no copyright restrictions
public- domain software...
Firewall
Domain name system
pipelining
42. Case of the system unit to protect internal damage
DIMM
stylus
chasis...
RSS 2.0
43. The design of computers - devices - and media in the network
network architecture
DLP projector
cyberterrorist
Internet Backbone
44. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
integrated circuit
capacity
recieving device
WAN
45. Connects the processor to cache.
spoofing
backside bus
Mainframe
E- retail
46. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
digital forensics
freeware...
ergonomics
fiber optic cable
47. Copyrighted software provided at no cost by company that retains all rights to software
multifunction peripheral
freeware...
CAD
corporate spies
48. Any unwanted signal usually varying quickly
multi- core processor
Noise
LAN
connector
49. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
cyberextortionist
MMS
groupware...
network standard
50. Joins a cable and a port
Notebook Computer
connector
star network
cyberextortionist