SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A personal computer you can carry from place to place
DTP
Mobile Computer
adapter card
Dial- up access
2. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
groupware...
POST
GUI
System Software...
3. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
system unit
phishing
WAN
protocol
4. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
Firewall
hacker
wireless Internet service provider
digital modem
5. Fetching - decoding - executing - storing
registrar
machine cycle
Noise
preemptive multitasking
6. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
peripheral
thread
Terminal
plaintext
7. A legal agreement that permits users to install the software on multiple computers.
site license
OSP
worm
Web Server
8. Privately owned and limited to a specific vendor or computer model.
proprietary software...
Memory Cache
worm
DVI
9. A document that you return to the company that creates and sends it.
motherboard
site license
turnaround document
synthesizer
10. Combines several GIF images ina single GIF file.
virus
IM
animated Gif...
certificate authority
11. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
ergonomics
chip
SMTP
register
12. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
Mainframe
certificate authority
port
spooling
13. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
honeypot
Motherboard
macros
wireless modem
14. Is a security measure that defines who can access it and what actions they can take while acessing the computer
Dial up modems
Notebook Computer
client/server
access control
15. Graphical User interface - interact with software using text - graphics - and icons
unethical employees
VR
GUI
RIMM
16. Mathematical formula that generates a code from the contents of the message
DTP
access control
scanner
hash
17. Integrates the functions of a processor - memory and a video card on a single chip.
system on a chip
sound card
VoIP
downloading
18. Controls timing of all computer operations
wordwrap
system clock
certificate authority
embedded operating system
19. A system that attempts to imitate the behavior of a human brain.
phishing
kernal
neural network
cracker
20. The code of acceptable behaviors users should follow while on the internet.
Information system
groupware...
Netiquette
Processor
21. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
plaintext
botnets
MICR
fiber optic cable
22. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
hard disk
Mainframe
bugs
defragmenting
23. The process of dividing the disk into tracks and sectors
CU
capacity
http
formatting
24. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
Trojan Horse
Bay
registrar
CAM
25. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
memory slots
volatile memory
Mainframe
802.11
26. Single inline memory module forms a single set of contacts
DSL
utility program
chat client
SIMM
27. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
crimeware
Software...
Latency
microbrowser
28. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
video card
CPU
cross - platform
Operating system
29. Uses devices that emit and sense light to detect the mouses movement
expansion slot
UNIX
optical mouse
fault tolerant computer
30. Smallest element in an electronic image
pixel
backside bus
twisted pair cable
RIMM
31. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
hypertext
POP3
buffer
SMTP
32. Circuit boards tjay provide connections and functions not built into the motherboard
adapter cards
stored program concept
ALU
OCR
33. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
EDI
buffer
Memory
solid state drive
34. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
Web Application
disk fragmenter
registrar
IM
35. Msot retail stores use POS to record purchases - process cards - and update inventory
DRAM
pretty good Privacy
Point of Sale terminals
network license
36. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
noise
network topology
bus network
project management software...
37. Errors that can be recognized by automatic update
downloading
bugs
Home user
Application software...
38. Graphics processing unit controls the manipulation and display of graphics on the display device.
Plug and Play
GPU
spyware
SIMM
39. Used to track and identify the location of high risk or high value items.
WAN
USB hub
broadband
RTLS
40. Operating system on mobile devices that generally resides on ROM
embedded operating system
Intrusion detection software...
firmware...
SIMM
41. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
ARPA
bus
Output
peer to peer network
42. Dish shaped antenna for internet connection
wordwrap
fixed wireless
plaintext
online auction
43. A window that provides info - presents availabe options - or requests a response.
dialog box
rootkit
hot plugging
phishing
44. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
online auction
E- commerce
server
Top level domain
45. A communications device that sends and recieves data and info to and from digital line
digital modem
TCP/IP
solid state media
IP address
46. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
business software...
CPU
ethernet
EFT
47. The last section of the domain name
LAN
Top level domain
CAPTCHA
hot spot
48. Perpetrator attempts to obtain your personal or financial info.
DVI
Noise
site license
phishing
49. Started the internet as a networking project
network architecture
cracker
ARPA
Desktop Computer
50. Someone who accesses a computer or network illegally. Some say they hack to improve security
cross - platform
DSL
hacker
coaxial cable