Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Determines the number of bits that can be transmitted at one time






2. Is a security measure that defines who can access it and what actions they can take while acessing the computer






3. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks






4. A type of storage media that consists of flat disc and is written and read by a laser






5. Digital light processor uses tiny mirrors to reflect light






6. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.






7. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.






8. Used to track and identify the location of high risk or high value items.






9. Transmits data via infared light waves.. Both computer and device must have the port for it to work






10. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement






11. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.






12. Media transmit multiple signals simutaneously. Download faster than upload






13. A unique number that identifies the location of a byte in memory






14. Mathematical formula that generates a code from the contents of the message






15. Used to gain competitive advantage






16. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






17. One or more computers on the network request services from the server. 10 or more computers






18. A set of programs that coordinates all of the activies among computer hardware devices.






19. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






20. Internet Service Provider- a regional or national access provider






21. Joins a cable and a port






22. Single chip with two or more processor cores.






23. A personal computer you can carry from place to place






24. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)






25. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile






26. The destructive event or prank the program intended to deliver






27. Initiates an instruction to transmit data - instructions - or information.






28. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






29. Single inline memory module forms a single set of contacts






30. Instead of port - jack is used to identify audio or video ports.






31. A device that enables you to join a port and a connector that are both male or female






32. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)






33. Loses its contents when power is turned off (RAM)






34. The original article and all subsequent related replies






35. Other computers and mobile devices on the networ that rely on the server for its resources






36. World wide web consortium oversees research and sets standards for many areas of the internet






37. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously






38. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.






39. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO






40. Contains 10 or fewer comps - with similar reponsibilities and capabilities






41. (laptop computer) portable personal computer often able to fit in your lap






42. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






43. Connects the processor to cache.






44. A family member on a computer






45. A rectangular opeining that typically holds disk drives.






46. Designed for mobile devices






47. Internet connections using regular copper telephone lines.






48. A real time internet communications service where you can talk to people online.






49. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time






50. Consumer consumer e commerce.