Test your basic knowledge |

Technology In Action - 2

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high-tech crime.






2. Documentation for a software product that is built directly into the software.






3. One billion hertz






4. A UTP cable type that provides more than 1 GB of throughput.






5. The process of installing all the files and programs from the distribution CD to the computer's hard drive.






6. The process by which humans or computer software provide organizational structure to a computer's contents.






7. A group of icons collected for easy access.






8. 'A network - consisting of client and server computers - in which the clients make requests of the server and the server returns the response.'






9. The maximum speed at which data can be transmitted between two nodes on a network; usually measured in megabits per second (Mbps). See also data transfer rate.






10. A common output device that displays text - graphics - and video as soft copies (copies that can be seen only on screen).






11. The process of restarting the system while it's powered on.






12. An interface through which external devices are connected to the computer.






13. A device that can project images from your computer onto a wall or viewing screen.






14. 'The portion of a company's intranet that is used to share business information with business partners such as vendors - suppliers - and customers.'






15. A card installed in a system that connects with wireless access points on the network.






16. A special diagnostic mode designed for troubleshooting errors that occur during the boot process.






17. A method of optical storage for digital data that has greater storage capacity than compact discs.






18. When two computers send data at the same time and the sets of data collide somewhere in the media.






19. 'The set of minimum storage - memory capacity - and processing standards recommended by the software manufacturer to ensure proper operation of a software application.'






20. The set of computer programs or instructions that tells the computer what to do and enables it to perform different tasks.






21. 'The result of an action - such as a keystroke - mouse click - or signal to the printer - in the respective device (keyboard - mouse - or printer) to which the operating system responds.'






22. 'The backslash mark () used by Microsoft Windows and DOS in file names. Mac files use a colon (:) - and UNIX and Linux use the forward slash (/) as the path separator.'






23. 'Software that handles requests for information - Internet access - and the use of peripherals for the rest of the network nodes.'






24. The set of techniques used in processing and retrieving information.






25. RAM that is included as part of a video card.






26. The pre-installed software (often trial versions) on a new computer.






27. A device similar to a switch in an Ethernet network. It takes the place of a wireless network adapter and helps relay data between network nodes.






28. The system software the controls the way in which a computer system functions - including the management of hardware - peripherals - and software.






29. 'A physical address - similar to a serial number on an appliance - that is assigned to each network adapter; it is made up of six 2-digit characters such as 01:40:87:44:79:A5.'






30. The first part of the label applied to a file; it is generally the name a user assigns to the file when saving it.






31. 'An operating system originally conceived in 1969 by Ken Thompson and Dennis Ritchie of AT&T's Bell Labs. In 1974 - the UNIX code was rewritten in the standard programming language C. Today there are various commercial versions of UNIX.'






32. A computer that requests information from a server in a client/server network (such as your computer when you are connected to the Internet).






33. 'A method of optical storage for digital data - developed for storing high-definition media. It has the largest storage capacity of all optical storage options.'






34. A block of code in the operating system that software applications need to interact with.






35. 'In a wireless network - a device that translates the electronic data that needs to be sent along the network into radio waves and then broadcasts these radio waves to other network nodes.'






36. 'A network topology in which each node on the network is responsible for retransmitting the token - or the data - to other nodes.'






37. The set of programs that enables a computer's hardware devices and application software to work together; it includes the operating system and utility programs.






38. 'The main function of an Internet appliance is easy access to the Internet - social networking sites - e-mail - video - news - and entertainment.'






39. A server that processes and delivers incoming and outgoing e-mail.






40. 'A device that combines the functionality of a cell phone - a PMP - and a PDA into one unit.'






41. The process by which great amounts of data are analyzed and investigates to spot significant patterns or trends within the data that would otherwise not be obvious.






42. Custom software application that is owned and controlled by the company that created it.






43. The maximum speed at which data can be transmitted between two nodes on a network; usually measured in megabits per second (Mbps).






44. A device that uses some unique characteristic of human biology to identify authorized users.






45. The width-to-height proportion of a monitor.






46. The design of a computer network; includes both physical and logical design.






47. A network device that is used to send data between two different local area networks (LANs) or two segments of the same LAN.






48. 'A tag that looks like a sticker or label - is attached to a batch of merchandise - and contains a microchip that holds a unique sequence of numbers used to identify the product to which it is attached.'






49. A wide area network (WAN) that links users in a specific geographic area (such as within a city or county).






50. The accommodation of current devices being able to use previously issued software standards in addition to the current standards.