Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Is a security measure that defines who can access it and what actions they can take while acessing the computer






2. zombie






3. Electrical supply drops.can cause data loss but generally not cause equipment damage






4. A communications device that enables a computer or device that does not have a built in networking capability to access a network






5. A communications device that sends and recieves data and info to and from digital line






6. Internet connections using regular copper telephone lines.






7. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.






8. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)






9. The discovery - collection adn analysis of evidence found on computers and networks






10. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used






11. When online meetings take place on the web






12. Text version of an IP address






13. Hypertext transfer protocol






14. A collection of data organized in a manner that allows access retrieval and use of that data






15. Dual inline memory module forms two sets of contact






16. A web site that evaluates your comouter to check for internet and e mail vulnerabilities






17. Basic input/output systemis firmware that contains the computers startup instructions






18. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






19. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.






20. A part of the motherboard and connects the processor to main memory






21. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor






22. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking






23. Operating system on mobile devices that generally resides on ROM






24. Has the illusion of moving images becuase it sends a continuos stream of images






25. Mathematical formula that generates a code from the contents of the message






26. A type of storage media that consists of flat disc and is written and read by a laser






27. Holds one or more disk drives






28. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






29. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)






30. Universal serial bus port connects peripherals to the computer






31. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously






32. Program that euns only on a specific type or make of computer






33. The use of computer or network with out permission






34. A real time internet communications service where you can talk to people online.






35. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor






36. Consumer consumer e commerce.






37. Processor begins to fetch a second instruction before it completes the full machine cycle






38. Two main parts are processor and memory.






39. A number that uniquely identifies each computer or device connected to the internet (0-255)






40. May break in to computer to exploit security weakness. financial gains - revenge.






41. Single inline memory module forms a single set of contacts






42. Small program that tells the operating system how to communicate with a specific device






43. A temporary connection that uses one or more analog telphone lines for communications.






44. A type of system software that allows users to perform maintenence type tasks






45. Software that helps groups of people work together on projects and share info over a network






46. A type of always on connection that is established between two communications devices. better than dial up line






47. A legal agreement that permits users to install the software on multiple computers.






48. Any data or instructions entered into the memory of the computer






49. Serves as the interface between the user - the app software - and the computers hardware






50. A notcie that guarantees a user or web site is legit. E- commerce use it often