SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provids mobile users with a secure connection to the company server as if the user has a private line.
virtual provate network
terminal
DLP projector
audit trail
2. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
ethernet
node
system software...
File compression utility
3. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
wireless modem
ergonomics
mpeg
DIMM
4. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
Home user
bugs
video card
Netiquette
5. Single inline memory module forms a single set of contacts
BIOS
SIMM
ALU
memory slots
6. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
backside bus
Mainframe
drive bay
online auction
7. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
disk fragmenter
address
ALU
spooling
8. Hypertext transfer protocol
telesurgery
virtual provate network
address
http
9. PGP an encryption program
embedded operating system
Software...
pretty good Privacy
hypermedia
10. Uses devices that emit and sense light to detect the mouses movement
FireWire port
back door
hard disk
optical mouse
11. One or more computers on the network request services from the server. 10 or more computers
chasis...
client/server
bandwidth
macros
12. Records in a file both successful and unsuccessful attempts.
system software...
phishing
audit trail
fault tolerant computer
13. A legal agreement that permits users to install the software on multiple computers.
Bay
bugs
site license
system bus
14. Health care professions conduct live conferences on the computer
telemedicine
ISP
traffic
solid state drive
15. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
E- commerce
Domain name
macros
multifunction peripheral
16. Software that helps groups of people work together on projects and share info over a network
groupware...
RSS 2.0
Denial of Service attack
telesurgery
17. Allows users to keep typing without using enter at the end of each line
RIMM
telesurgery
port
wordwrap
18. A program that hides in a computer and allows someone from a remote location to take control of the computer
CPU
rootkit
system bus
mpeg
19. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
TCP/IP
Point of Sale terminals
LAN
message board
20. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
worm
DSL
USB hub
proxy server
21. Saves any open documents and programs to RAM and places computer into a low power state
crimeware
backside bus
volatile memory
sleep mode
22. Company that provides wireless internet access to computers
cable modem
wireless Internet service provider
telesurgery
OSP
23. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
multifunction peripheral
driver
chasis...
adapter card
24. Program is one that runs the same on multiple operating systems
network card
system software...
cross - platform
Denial of Service attack
25. Small capacity built directly in the processor chip
supercomputer
L1 cache
traffic
IM
26. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
MRAM
utility program
Linux
superscalar
27. A notcie that guarantees a user or web site is legit. E- commerce use it often
network architecture
CERT/CC
digital certificate
byte
28. Uses radio waves to transmit data between two devices.
disk fragmenter
registrar
formatting
Bluetooth
29. Unencrypted readable data
plaintext
cyberterrorist
wireless modem
preemptive multitasking
30. Graphics processing unit controls the manipulation and display of graphics on the display device.
video card
adware
animated Gif...
GPU
31. Communications activity. Handled by NSFnet.
warm boot
bus
GUI
traffic
32. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
802.11
System Unit
preemptive multitasking
ALU
33. Can be peropheral or chip - creates sound from digital instructions.
Netiquette
EDI
utility program
synthesizer
34. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
proxy server
SRAM
drive bay
macros
35. A family member on a computer
Home user
trackball
SIMM
integrated circuit
36. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
bus
project management software...
digital
ciphertext
37. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
Point of Sale terminals
hypermedia
product activation
PIM
38. They can execute more than one instruction per clock cycle
heat sink
Dial up modems
superscalar
downloading
39. A rectangular opeining that typically holds disk drives.
DNS Server
botnets
CPU
Drive Bay
40. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
sending device
Firewall
wireless Internet service provider
plaintext
41. Personal information manager is application software that includes features to help users organize personal info
hot spot
Storage Device
Memory
PIM
42. When businesses use the internet to sell products
E- retail
Notebook Computer
Personal Computers
player
43. The destructive event or prank the program intended to deliver
payload
Plug and Play
network topology
broadband
44. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
Web conference
transistor
digital certificate
worm
45. Smallest unit of data the computer can process
utility program
density
bit
Storage Media
46. A special purpose computer that functions as a component in a larger product. Small with limited hardware
embedded computer
pretty good Privacy
register
DTP
47. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
noise
air mouse
Trojan Horse
fiber optic cable
48. A type of always on connection that is established between two communications devices. better than dial up line
heat pipe
Dedicated line
GPU
motherboard
49. Computing device small enough to hold in your hand
embedded computer
adware
Mainframe
Mobile Device
50. CA resposible for giving out digital certificate
terminal
L2 cache
certificate authority
newsgroup