Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee






2. Someone who uses internet to destroy or damage computers for political reasons.






3. A part of the motherboard and connects the processor to main memory






4. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.






5. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.






6. Instead of port - jack is used to identify audio or video ports.






7. ...






8. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used






9. Control unit- part of the processor that directs and coordinates most of the operations on the computer.






10. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster






11. Multitasking operating system sold by Sun and IBM. stand alone and server operating system






12. 8 bits grouped together. basic storage unit in memory. Each byte has an address






13. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.






14. The destructive event or prank the program intended to deliver






15. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device






16. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.






17. The technology of authenticating a persons identity by verifying a personal characteristic.






18. Links in text based documents






19. A family member on a computer






20. A vulnerable computer that is set up to entice an intruder to break into it.






21. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.






22. Has the illusion of moving images becuase it sends a continuos stream of images






23. Provids mobile users with a secure connection to the company server as if the user has a private line.






24. zombie






25. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches






26. When online meetings take place on the web






27. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters






28. The use of computer or network with out permission






29. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.






30. Donated for public use has no copyright restrictions






31. Smallest element in an electronic image






32. Extends the capabilites of a browser.






33. Contain permanently writeen data - instructions - and information






34. Contains 10 or fewer comps - with similar reponsibilities and capabilities






35. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)






36. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.






37. A collection of computers and devices connected together - via communications devices and transmissions media.






38. Text version of an IP address






39. Communications activity. Handled by NSFnet.






40. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks






41. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media






42. Federally funded internet security research and development center






43. A type of always on connection that is established between two communications devices. better than dial up line






44. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching






45. Human speech is bc of its continous signal that vary in strength and quality






46. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)






47. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon






48. Searches for and removes unneccessary files






49. Internet connections using regular copper telephone lines.






50. A web application that combines services from two or more sources creating a new application.