Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Instead of port - jack is used to identify audio or video ports.






2. Reorganizing it so that the files are store in continous sectors






3. A computer that delivers requested web pages to your computer






4. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.






5. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor






6. The original article and all subsequent related replies






7. When turning on a computer that has been turned off completly






8. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN






9. CA resposible for giving out digital certificate






10. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time






11. On software is infinitie space and depth for VR






12. Is an online area in which isers have wrtten discussions about a particular subject.






13. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money






14. A real time internet communications service where you can talk to people online.






15. Builds and maintains lists of words found on websites. Useful for search engines






16. A type of always on connection that is established between two communications devices. better than dial up line






17. A personal computer you can carry from place to place






18. A vulnerable computer that is set up to entice an intruder to break into it.






19. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.






20. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network






21. Rambus inline memory module house RDRAM chips






22. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.






23. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously






24. May break in to computer to exploit security weakness. financial gains - revenge.






25. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed






26. Uses radio waves to transmit data between two devices.






27. Cables - telephone lines - radio networks - satellites






28. Saves any open docs or programs to hardisk before removing power






29. Text version of an IP address






30. Surgeon performs operation by controlling robot when not in the same area as patient.






31. Hardware - software - data - people - procedures






32. Read only memory refers to memory chips storing permanent data and instructions (firmware)






33. A part of the motherboard and connects the processor to main memory






34. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers






35. Graphic file (JPEG - GIF) slowly replacing GIF






36. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.






37. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance






38. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)






39. All computers connected to central device. Hub or switch






40. Retains existing application software and data files even if you can change computer models or vendors






41. The delivery of education via some electronic method such as the internet - networks - or optical disks.






42. A small flat rectangular pointing device that is sensitive to pressure and motion.






43. Errors that can be recognized by automatic update






44. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more






45. World wide web consortium oversees research and sets standards for many areas of the internet






46. A rectangular opeining that typically holds disk drives.






47. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






48. Extends the capabilites of a browser.






49. The number of bytes a storage medium can hold






50. Combines several GIF images ina single GIF file.