SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
capacity
turnaround document
Personal Computers
bugs
2. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
WAN
registrar
IrDA Port
heat sink
3. A type of system software that allows users to perform maintenence type tasks
utility program
jack
disk fragmenter
token ring
4. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
Mobile Device
802.11
heat sink
site license
5. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
CMOS
Hot spots
compromised computer
sound card
6. Provides the user with a physcial response from the device
L2 cache
tactile output
DSL
web filter
7. Links in text based documents
DSL modem
hypertext
Netiquette
system software...
8. Mathematical formula that generates a code from the contents of the message
hash
cable modem
program
Domain name system
9. Saves any open documents and programs to RAM and places computer into a low power state
shareware...
digital signature
terminal
sleep mode
10. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
thread
adapter cards
bus
cross - platform
11. An instruction that causes a program to perform a specific action.
IP address
hacker
commands
DNS Server
12. Consists of electronic components that store instructions waiting to be executed (On motherboard)
newsgroup
Memory
bugs
bit
13. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
OCR
VR world
twisted pair cable
digital certificate
14. Internet teephony- enables users to speak to other users over the internet
optical reader
hash
jack
VoIP
15. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
Drive Bay
fault tolerant computer
VR world
CAM
16. Accepts the transmission of data - instructions - or info
recieving device
VR world
byte
SMTP
17. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
honeypot
system unit
ring network
video card
18. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
memory slots
adapter card
newsgroup
scanner
19. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
CAPTCHA
macros
turnaround document
Processor
20. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
http
adware
analog
multifunction peripheral
21. Operating system on mobile devices that generally resides on ROM
pipelining
embedded operating system
dialog box
CU
22. Copyrighted software that is distributed at no cost for a trial period
public- domain software...
protocol
Drive Bay
shareware...
23. Processor begins to fetch a second instruction before it completes the full machine cycle
cold boot
pipelining
NAS
pixel
24. Graphical User interface - interact with software using text - graphics - and icons
L2 cache
nonvolatile memory
Desktop Computer
GUI
25. Dynamic ram- chips must be re energized constantly or they lose their contents.
DRAM
phishing
newsreader
ethernet
26. A communications device that enables a computer or device that does not have a built in networking capability to access a network
freeware...
network card
ciphertext
star network
27. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
CU
scanner
router
cold boot
28. A type of always on connection that is established between two communications devices. better than dial up line
Dedicated line
solid state media
nonvolatile memory
warm boot
29. Combines several GIF images ina single GIF file.
animated Gif...
cyberterrorist
superscalar
Latency
30. Program is one that runs the same on multiple operating systems
cross - platform
digital forensics
hacker
web filter
31. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
UNIX
unethical employees
DIMM
TLS
32. Special software to listen to audio
Motherboard
pixel
player
Memory Cache
33. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
Web Application
MICR
analog
payload
34. Electrical supply drops.can cause data loss but generally not cause equipment damage
undervoltage
animated Gif...
disk cleanup
communications channel
35. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
phishing
Application software...
air mouse
MAN
36. Completely Automated Public Turing test to tell Computers and Humans Apart.
W3C
optical mouse
firmware...
CAPTCHA
37. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
utility program
Software...
bandwidth
VAN
38. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
dialog box
TCP/IP
GUI
Web Browser
39. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
virtual provate network
virus signature
ghosting
power supply
40. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
ASCII
shareware...
spoofing
DIMM
41. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
telesurgery
Application software...
Processor
connector
42. Graphic file (JPEG - GIF) slowly replacing GIF
digital signature
Content Aggregator
PNG
Memory Cache
43. (laptop computer) portable personal computer often able to fit in your lap
Intrusion detection software...
Notebook Computer
CAPTCHA
air mouse
44. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
unethical employees
multi- core processor
ciphertext
E- commerce
45. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
hot spot
Web Server
cyberextortionist
density
46. Program that euns only on a specific type or make of computer
DSL
device dependant
microbrowser
ethernet
47. Contain permanently writeen data - instructions - and information
firmware...
hot spot
DIMM
optical disc
48. Other computers and mobile devices on the networ that rely on the server for its resources
ghosting
proxy server
Motherboard
client
49. May break in to computer to exploit security weakness. financial gains - revenge.
unethical employees
rootkit
defragmenting
noise
50. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
worm
stored program concept
token ring
trackball