Test your basic knowledge |

Technology In Action - 2

Subjects : it-skills, literacy
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. DVD format in which data can only be read and not written.






2. An active topology (meaning that data is retransmitted) in which the nodes connect to a central communications device called a switch. The switch receives a signal from the sending node and retransmits it to the node that should receive it.






3. The technology used in flat-panel computer monitors.






4. A fast transfer port.






5. 'Software that handles requests for information - Internet access - and the use of peripherals for the rest of the network nodes.'






6. 'Someone who has training in computer and peripheral maintenance and repair - network design - and the installation of network software; installs new equipment - configures computers for users - repairs equipment - and assigns network access to users






7. 'A device on a network such as a router - hub - and switch that moves data signals around the network.'






8. 'In Windows 7 - a folder that is used to display files from different locations as if they were all saved in a single folder - regardless of where they are actually stored in the file hierarchy.'






9. A special numerical code that prioritizes requests from various devices. These requests then are placed in the interrupt table in the computer's primary memory.






10. A network that uses public communication pathways (usually the Internet) to provide branch offices or employees who are not at the office with secure access to the company network. VPNs maintain privacy by using secure data communication protocols.






11. A pen-shaped device used to tap or write on tough-sensitive screens.






12. Temporary storage - such as in random access memory (RAM) - When the power is off - the data in volatile storage is cleared out.






13. 'A private corporate network that is used exclusively by company employees to facilitate information sharing - database access - group scheduling - videoconferencing - and other employee and customer collaborations.'






14. 'The time it takes for the hard drive's read/write heads to move over the surface of the disk - between tracks - to the correct track.'






15. 'An attack delivered by specialized hacking software that tries many combinations of letters - numbers - and pieces of a user ID in an attempt to discover a user password.'






16. Portable - nonvolatile memory.






17. A type of network in which users are responsible for creating their own data backups and for providing security for their computers.






18. A device that uses some unique characteristic of human biology to identify authorized users.






19. A device that amplifies your wireless signal to get it out to parts of your home that are experiencing poor connectivity.






20. A mouse that uses an internal sensor or a laser to conrtol the mouse's movement. The sensor sends signals to the computer - telling it where to move the pointer on the screen.






21. The process by which great amounts of data are analyzed and investigates to spot significant patterns or trends within the data that would otherwise not be obvious.






22. 'An application program that helps business owners manage their finances more efficiently by providing tools for tracking accounting transactions such as sales - accounts receivable - inventory purchases - and accounts payable.'






23. The part of the system unit of a computer that is responsible for data processing ( the 'brains' of the computer); it is the largest and most important chip in the computer. The CPU controls all the functionsperformed by the computer's other componen






24. 'A hierarchical structure that include files - folders - and drives used to create a more organized and efficient computer.'






25. 'One of two recognized DVD formats that enables you to both read - record (R) - and rewrite (RW) data on the disc.'






26. A server that provides client computers with access to information stored in a database.






27. A self-regulatory body established in 1994 by the Entertainment Software Association that rates computer and video games according to the age appropriateness of content.






28. A hardware device used to enter - or input - data (text - images - and sounds) and instructions (user responses and commands) into a computer. Some input devices are keyboards and mice.






29. A small - joystick-like nub that enables you to move the cursor with the tip of your finger.






30. A type of monitor ( or display in a notebook or PDA) that accepts input from a user touching the screen.






31. A device similar to a switch in an Ethernet network. It takes the place of a wireless network adapter and helps relay data between network nodes.






32. The process of users transferring files between computers.






33. 'The backslash mark () used by Microsoft Windows and DOS in file names. Mac files use a colon (:) - and UNIX and Linux use the forward slash (/) as the path separator.'






34. A printer that has tiny hammer-like keys that strike the paper through an inked ribbon - thus making a mark on the paper. The most common impact printer is the dot-matrix printer.






35. A software holding area for printing jobs.






36. A measure of the greatest amount of light showing when a monitor is displaying pure white; measured as candelas per square meter (cd/m^2) or nits.






37. The maximum speed at which data can be transmitted between two nodes on a network; usually measured in megabits per second (Mbps).






38. The accommodation of current devices being able to use previously issued software standards in addition to the current standards.






39. A mouse with a rollerball on top instead of on the bottom. Because you move the trackball with your fingers - it doesn't require much wrist motion - so it is considered healthier for your wrist than a traditional mouse.






40. The 802.11 standard for wireless data transmissions established by the Institute of Electrical and Electronics Engineers (IEEE).






41. Anyone who unlawfully breaks into a computer system (whether an individual computer or a network).






42. Programs for editing photographs and other images.






43. A set of controls on standard keyboards that moves the cursor(the flashing symbol on the monitor that indicates where the next character will be inserted); also known as an arrow key.






44. A set of memory chips - located on the motherboard - which stores data and instructions that cannot be changed or erased; it holds all the instructions the computer needs to start up.






45. A program that manages the data between a computer's operating system and all the input and output devices attached to the computer; also responsible for loading the operating system (OS) from its permanent location on the hard drive to random access






46. A small camera that sits on top of a computer monitor (connected to the computer by a cable) or is built into a notebook computer and is usually used to transfer live video.






47. A computer that provides resources to other computers on a network.






48. A server that manages all client-requested printing jobs for all printers on the network.






49. A small - compact portable computer.






50. A port that can connect a wide variety of peripherial devices to the computer - including keyboards - printers - mice - smartphones - PDAs - flash drives - and digital cameras.