Browse Definitions :

Quiz: Processing Power

How to take the quiz:
- After reading the question, click on the answer that you think iscorrect. If the answer you've chosenis correct, you will see the question text (or a paraphrase of it) somewherein the definition.
- Check your answers by using the answer key at theend of the quiz.

1. This is resetting your computer so that the microprocessorruns faster than the manufacturer-specified speed.
a. thrashing
b. debouncing
c. stepping
d. overclocking
e. load balancing

2. This was the first processor to be shipped with a 1 gigahertz (onebillion hertz) clock speed.
a. Athlon
b. BeOS
c. Crusoe
e. Pentium

3. This is the continuous and somewhat overlapped movement of instructionsto the processor.
a. flow control
b. cyclic redundancy checking
c. inverse multiplexing
d. pathing
e. pipelining

4. This is the data path and physical interface between the processorand the L1 and L2 memory.
a. backlink
b. backside bus
c. CardBus
d. footprint
e. virtual memory

5. This is a group of microchips designed to work as a unitto perform one or more related functions.
a. biochip
b. networking chip
c. chipset
d. diode
e. solid-state

6. This is computer object code that is processed by a program rather than bythe hardware processor.
a. critical section routine
b. virtual memory
c. Unicode
d. bytecode
e. initial program load

7. This is a special program that processes statements written in aparticular programming language and turns them into machine language or"code" that a computer's processor uses.
a. compiler
b. loader
c. instruction
d. problem program
e. logic gate

8. This is the logic circuitry that responds to and processesthe basic instructions that drive a computer.
a. oscillator
b. daughterboard
c. transponder
d. transducer
e. processor

9. This is one of a small set of data holding places that is part ofa computer's microprocessor.
a. register
b. spool
c. buffer
d. capacitor
e. queue

10. This is random access memory (RAM) that a computer microprocessorcan access more quickly than it can access regular RAM.
a. shared memory
b. cache memory
c. stale data
d. burst SRAM


See the rest of our quiz topics

Answer key: 1d; 2a; 3e; 4b; 5c; 6d; 7a; 8e; 9a; 10b

This was last updated in July 2008



  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...



  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...