Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Latest version of Post office Protocol






2. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.






3. Storage over an internet service






4. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)






5. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.






6. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






7. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters






8. Software used by criminals






9. Graphical User interface - interact with software using text - graphics - and icons






10. Acts as an electronic switch that opens or closes the circuit for electrical charges






11. Loses its contents when power is turned off (RAM)






12. Communications activity. Handled by NSFnet.






13. Smallest element in an electronic image






14. Universal serial bus port connects peripherals to the computer






15. A program that hides in a computer and allows someone from a remote location to take control of the computer






16. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data






17. Provids mobile users with a secure connection to the company server as if the user has a private line.






18. ...






19. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster






20. A personal computer you can carry from place to place






21. Picure messaging can occur from mobile to mobile and mobile to email






22. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.






23. A special purpose computer that functions as a component in a larger product. Small with limited hardware






24. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.






25. A number that uniquely identifies each computer or device connected to the internet (0-255)






26. Digital light processor uses tiny mirrors to reflect light






27. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media






28. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly






29. Copies itself repeatedly in memory using up system resources and possibly shutting down the system






30. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing






31. 8 bits grouped together. basic storage unit in memory. Each byte has an address






32. The design of computers - devices - and media in the network






33. An instruction that causes a program to perform a specific action.






34. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






35. A notcie that guarantees a user or web site is legit. E- commerce use it often






36. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software






37. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)






38. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.






39. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state






40. Processor begins to fetch a second instruction before it completes the full machine cycle






41. A communications device that sends and recieves data and info to and from digital line






42. PGP an encryption program






43. zombie






44. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)






45. Allows the processor to communicate with peripherals.






46. System board- is the main circuit board of the system unit.






47. Single inline memory module forms a single set of contacts






48. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out






49. Consists of electronic components that store instructions waiting to be executed (On motherboard)






50. Holds one or more disk drives