Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any data or instructions entered into the memory of the computer






2. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.






3. Provides the user with a physcial response from the device






4. CA resposible for giving out digital certificate






5. Accepts the transmission of data - instructions - or info






6. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






7. Computer aided design software assists a professional user in creating designs






8. The last section of the domain name






9. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration






10. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.






11. Uses radio waves to transmit data between two devices.






12. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -






13. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.






14. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more






15. May break in to computer to exploit security weakness. financial gains - revenge.






16. A rectangular opeining that typically holds disk drives.






17. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out






18. A program that hides in a computer and allows someone from a remote location to take control of the computer






19. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest






20. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email






21. A unique number that identifies the location of a byte in memory






22. A program that restricts access to certain material on the web






23. An electrical disturbance that can degrade communications






24. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






25. Determines the number of bits that can be transmitted at one time






26. (program) consists of related instructions that tells computer what tasks to perform and how to perform them






27. Method that the internet uses to store domain names and their corressponding IP addresses






28. System board- is the main circuit board of the system unit.






29. Special software to listen to audio






30. The amount of data - instructions - and information that can travel over communications channel






31. Graphics processing unit controls the manipulation and display of graphics on the display device.






32. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system






33. Combines several GIF images ina single GIF file.






34. Rambus inline memory module house RDRAM chips






35. Can connect multiple types of devices that require faster data transmission speeds.






36. A know specific pattern of virus code.






37. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.






38. Dish shaped antenna for internet connection






39. Smaller than heat sink cools processors in notebook comps






40. Graphical User interface - interact with software using text - graphics - and icons






41. A system that attempts to imitate the behavior of a human brain.






42. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting






43. Two or more computers transfer data - instructions - and information.






44. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.






45. Power on self test to check the various system components and the results are compared with data in a CMOS chip






46. Graphic file (JPEG - GIF) slowly replacing GIF






47. Program that euns only on a specific type or make of computer






48. Circuit boards tjay provide connections and functions not built into the motherboard






49. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif






50. Needed generally to participate in a newsgroup