SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used to gain competitive advantage
chat client
corporate spies
payload
defragmenting
2. A small flat rectangular pointing device that is sensitive to pressure and motion.
broadband internet service
touchpad
communications
OSP
3. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
digital forensics
device dependant
adapter cards
Latency
4. Smallest element in an electronic image
botnets
sending device
pixel
USB hub
5. The delivery of education via some electronic method such as the internet - networks - or optical disks.
database
keygen
e- learning
PIM
6. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
buffer
VR
RIMM
broadband
7. Designed for mobile devices
Motherboard
microbrowser
Laser printer
noise
8. Saves any open docs or programs to hardisk before removing power
telemedicine
hibernate
Web Application
business software...
9. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
preemptive multitasking
access control
hypermedia
10. Any data or instructions entered into the memory of the computer
density
Input
online auction
heat sink
11. An instruction that causes a program to perform a specific action.
database
server
commands
Latency
12. Connects the processor to cache.
trackball
backside bus
cold boot
sound card
13. Computer aided design software assists a professional user in creating designs
network topology
communications channel
CAD
digital signature
14. Retains existing application software and data files even if you can change computer models or vendors
device independent
POST
certificate authority
spoofing
15. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
payload
Operating system
Application software...
volatile memory
16. Small program that tells the operating system how to communicate with a specific device
preemptive multitasking
driver
turnaround document
L2 cache
17. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
business software...
traffic
adapter cards
download
18. Loses its contents when power is turned off (RAM)
volatile memory
Latency
client/server
firmware...
19. A program that hides in a computer and allows someone from a remote location to take control of the computer
rootkit
document management software...
PNG
thread
20. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
device dependant
hypermedia
cyberextortionist
Linux
21. They consist entirely of electronic components and contain no moving parts.
preemptive multitasking
solid state media
OCR
access control
22. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
fixed wireless
system bus
L1 cache
back door
23. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
script kiddie
communications channel
stylus
streaming cam
24. A document that you return to the company that creates and sends it.
SRAM
script kiddie
bus
turnaround document
25. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
adapter cards
heat sink
Desktop Computer
ring network
26. (laptop computer) portable personal computer often able to fit in your lap
newsgroup
Notebook Computer
star network
Bluetooth
27. When turning on a computer that has been turned off completly
cold boot
UNIX
network architecture
Firewall
28. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
drive bay
optical reader
kernal
optical disc
29. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
keygen
online security service
program
online auction
30. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
twisted pair cable
client/server
system on a chip
server
31. Optical mark recognition reads hand drawn marks such as circles or rectangles.
microbrowser
program
OMR
ciphertext
32. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
ALU
application software...
multi- core processor
Trojan Horse
33. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
MAN
Web Application
Web Browser
RTLS
34. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
L1 cache
EFT
kernal
Terminal
35. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
adapter cards
access time
digital forensics
cross - platform
36. Power on self test to check the various system components and the results are compared with data in a CMOS chip
unethical employees
POST
E- commerce
Netiquette
37. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
DSL
spooling
Transmission media
wireless Internet service provider
38. Case of the system unit to protect internal damage
Memory
chasis...
Netbook
Drive Bay
39. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
Software...
Netiquette
machine cycle
cracker
40. Controls timing of all computer operations
TLS
proprietary software...
system unit
system clock
41. Protective case for optical discs
e- learning
Memory
jewel box
motherboard
42. Allows users to keep typing without using enter at the end of each line
network license
wordwrap
Web Server
system on a chip
43. Digital light processor uses tiny mirrors to reflect light
bus
hot plugging
DLP projector
Denial of Service attack
44. Msot retail stores use POS to record purchases - process cards - and update inventory
wordwrap
Point of Sale terminals
e- learning
Application software...
45. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
multifunction peripheral
E- commerce
CU
L1 cache
46. A temporary connection that uses one or more analog telphone lines for communications.
newsreader
optical reader
Application software...
Dial Up line
47. Consumer consumer e commerce.
wireless Internet service provider
token ring
online auction
Content Aggregator
48. Combines several GIF images ina single GIF file.
animated Gif...
adapter cards
analog
broadband internet service
49. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
disk cleanup
network
ALU
CPU
50. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
hypertext
EULA
cold boot
proxy server