SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
spooling
CPU
Memory
Mobile Computer
2. Media transmit multiple signals simutaneously. Download faster than upload
utility programs
broadband
DVI
cluster
3. Retains existing application software and data files even if you can change computer models or vendors
System Unit
device independent
POST
broadband
4. Online service provider- has many members features along with internet access such as IM or Web browsers.
tactile output
Information system
communications channel
OSP
5. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
spyware
DSL modem
groupware...
solid state media
6. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
EDI
byte
program
L1 cache
7. Records in a file both successful and unsuccessful attempts.
freeware...
shareware...
audit trail
e- learning
8. Basic input/output systemis firmware that contains the computers startup instructions
BIOS
Memory
LAN
downloading
9. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
Personal Computers
solid state drive
preemptive multitasking
fixed wireless
10. Optical mark recognition reads hand drawn marks such as circles or rectangles.
Mobile Computer
protocol
Transmission media
OMR
11. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
System Software...
wireless modem
Terminal
digital forensics
12. The technology of authenticating a persons identity by verifying a personal characteristic.
message board
adware
driver
biometrics
13. The process if a computer or device recieveing info info from the server on the internet
downloading
cable modem
streaming cam
ring network
14. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
Dial- up access
multi- core processor
biometrics
SRAM
15. Allows users to keep typing without using enter at the end of each line
EFT
newsgroup
E- commerce
wordwrap
16. Combines several GIF images ina single GIF file.
hypertext
animated Gif...
microbrowser
Motherboard
17. A small metal or plastic device that uses pressure instead of ink.
stylus
VoIP
noise
pixel
18. Special software to listen to audio
RFID
MAN
player
phishing
19. Consumer consumer e commerce.
project management software...
online auction
GPU
multi- core processor
20. They can execute more than one instruction per clock cycle
warm boot
superscalar
optical mouse
streaming cam
21. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
formatting
Application software...
coaxial cable
IM
22. Perpetrator attempts to obtain your personal or financial info.
pointing stick
nonvolatile memory
phishing
newsgroup
23. Extends the capabilites of a browser.
certificate authority
Dial Up line
plug- in
neural network
24. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
drive bay
utility programs
Plug and Play
PIM
25. Provids mobile users with a secure connection to the company server as if the user has a private line.
solid state media
File compression utility
virtual provate network
virus
26. The destructive event or prank the program intended to deliver
MMS
downloading
address
payload
27. Determines the number of bits that can be transmitted at one time
cloud storage
certificate authority
fault tolerant computer
bus width
28. Started the internet as a networking project
hash
telemedicine
groupware...
ARPA
29. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
transistor
Dial up modems
virtual provate network
System Software...
30. When online meetings take place on the web
wordwrap
Web conference
cyberterrorist
CAM
31. Each computer or device on the network. often connected by cables
E- retail
SMTP
node
protocol
32. (laptop computer) portable personal computer often able to fit in your lap
Notebook Computer
router
rootkit
application software...
33. Company that provides wireless internet access to computers
Domain name
wireless Internet service provider
Netiquette
Storage Device
34. Operating system on mobile devices that generally resides on ROM
unethical employees
Communications device
optical reader
embedded operating system
35. A window that provides info - presents availabe options - or requests a response.
macros
optical mouse
dialog box
database
36. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
compromised computer
Dial Up line
density
streaming
37. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
back door
touchpad
spoofing
Denial of Service attack
38. Dish shaped antenna for internet connection
neural network
fixed wireless
worm
PIM
39. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
utility programs
warm boot
Storage Media
bandwidth
40. Protective case for optical discs
certificate authority
jewel box
E- commerce
memory module
41. Connects the processor to cache.
Dial Up line
Memory
optical mouse
backside bus
42. Fetching - decoding - executing - storing
online security service
Motherboard
bus width
machine cycle
43. A program that hides in a computer and allows someone from a remote location to take control of the computer
rootkit
pointing stick
software suite
Memory
44. Other computers and mobile devices on the networ that rely on the server for its resources
client
virus signature
Dial Up line
802.11
45. Joins a cable and a port
Noise
connector
node
plug- in
46. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
utility program
DSL
SRAM
air mouse
47. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
network architecture
document management software...
synthesizer
adware
48. Needed generally to participate in a newsgroup
system clock
LAN
density
newsreader
49. A personal computer you can carry from place to place
system software...
access control
Mobile Computer
cracker
50. Hides within or looks like a legitimate program such as a screen saver
DIMM
unauthorized access
Trojan Horse
VR