SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Saves any open documents and programs to RAM and places computer into a low power state
compromised computer
broadband internet service
sleep mode
Laser printer
2. The last section of the domain name
Top level domain
L2 cache
MICR
density
3. A legal agreement that permits users to install the software on multiple computers.
site license
Domain name system
WAN
register
4. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
http
peer to peer network
Laser printer
SIMM
5. Loses its contents when power is turned off (RAM)
POST
volatile memory
DSL modem
wireless Internet service provider
6. Obtains data directly at the location where the transaction or event takes place.
File compression utility
E- commerce
data collection device
fault tolerant computer
7. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
undervoltage
spooling
TLS
jack
8. zombie
MICR
compromised computer
Fiber to the Premises
802.11
9. Personal information manager is application software that includes features to help users organize personal info
PIM
CERT/CC
Memory
density
10. A device that enables you to join a port and a connector that are both male or female
client/server
gender changer
RTLS
connector
11. System board- is the main circuit board of the system unit.
streaming
motherboard
image processing
GPU
12. Dual inline memory module forms two sets of contact
IM
DNS Server
DIMM
System Software...
13. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
thread
memory module
spoofing
RTLS
14. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
IP address
Personal Computers
RTLS
VAN
15. Local area network- network tat connects computers and devices in a limited geographical area such as a home
address
sleep mode
disk controller
LAN
16. Unencrypted readable data
fiber optic cable
plaintext
Operating system
proxy server
17. Other computers and mobile devices on the networ that rely on the server for its resources
site license
OSP
tactile output
client
18. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
dot matrix printer
Mobile Device
network architecture
DSL
19. Graphic file (JPEG - GIF) slowly replacing GIF
PNG
wireless Internet service provider
Drive Bay
shareware...
20. Smallest element in an electronic image
disk fragmenter
pixel
Terminal
RSS 2.0
21. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
Storage Media
nonvolatile memory
air mouse
solid state drive
22. Communications activity. Handled by NSFnet.
power supply
ergonomics
proprietary software...
traffic
23. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
Laser printer
bus
bandwidth
VR
24. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
RAM
business software...
application software...
chip
25. Links in text based documents
hypertext
IP address
node
Fiber to the Premises
26. Provides the user with a physcial response from the device
pixel
back door
gender changer
tactile output
27. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
Software...
virus signature
groupware...
worm
28. Errors that can be recognized by automatic update
spooling
bugs
proxy server
gender changer
29. The process if a computer or device recieveing info info from the server on the internet
downloading
dot matrix printer
overvoltage
EULA
30. Joins a cable and a port
star network
macros
ethernet
connector
31. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
wireless modem
telesurgery
Processor
noise
32. Mathematical formula that generates a code from the contents of the message
hash
Notebook Computer
wireless modem
optical disc
33. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
spyware
machine cycle
telemedicine
database
34. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
File compression utility
NAS
streaming
density
35. All computers connected to central device. Hub or switch
worm
Linux
star network
system bus
36. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
nonvolatile memory
MRAM
hot plugging
network license
37. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
ISP
Web Application
trackball
business software...
38. Power on self test to check the various system components and the results are compared with data in a CMOS chip
undervoltage
fiber optic cable
cold boot
POST
39. The technology of authenticating a persons identity by verifying a personal characteristic.
keygen
air mouse
Web Browser
biometrics
40. Allows users to keep typing without using enter at the end of each line
DRAM
Mobile Device
wordwrap
sleep mode
41. Each computer or device on the network. often connected by cables
node
Internet Backbone
wireless modem
Input
42. Transmits data via infared light waves.. Both computer and device must have the port for it to work
Web Application
audit trail
downloading
IrDA Port
43. The standard that outlines characteristics of how two network devices communicate
network standard
protocol
phishing
CAM
44. A server that you connect to to start a chat session.
application software...
chat client
RAID
RFID
45. They can execute more than one instruction per clock cycle
stylus
virus signature
overvoltage
superscalar
46. Retains existing application software and data files even if you can change computer models or vendors
document management software...
device independent
network standard
communications
47. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
IM
nonvolatile memory
download
Storage Device
48. Uses fiber optic cable for internet connection.
Fiber to the Premises
File compression utility
hash
cyberterrorist
49. Used to track and identify the location of high risk or high value items.
ASCII
RTLS
Bluetooth
EULA
50. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
platter
bus network
Software...
defragmenting