Test your basic knowledge |

Cse Computer Science Engineering

Subjects : engineering, it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software used by criminals






2. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.






3. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses






4. Encrypted data






5. Internet connections using regular copper telephone lines.






6. Contains 10 or fewer comps - with similar reponsibilities and capabilities






7. Perpetrator attempts to obtain your personal or financial info.






8. A rectangular opeining that typically holds disk drives.






9. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously






10. Designed for mobile devices






11. The role of memory to store both data and programs






12. Integrates the functions of a processor - memory and a video card on a single chip.






13. Computer automatically can configure adapter cards and other peripherals as you install them






14. Someone who accesses a computer or network illegally. Some say they hack to improve security






15. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info






16. Online service provider- has many members features along with internet access such as IM or Web browsers.






17. Other computers and mobile devices on the networ that rely on the server for its resources






18. Each computer or device on the network. often connected by cables






19. Uses fiber optic cable for internet connection.






20. Can connect multiple types of devices that require faster data transmission speeds.






21. Programs designed to make users more productive and assist them with personal tasks. (Web browser)






22. The design of computers - devices - and media in the network






23. A part of the motherboard and connects the processor to main memory






24. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device






25. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)






26. The process of dividing the disk into tracks and sectors






27. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.






28. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware






29. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile






30. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.






31. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o






32. Protective case for optical discs






33. A server that you connect to to start a chat session.






34. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration






35. Serves as the interface between the user - the app software - and the computers hardware






36. Communications activity. Handled by NSFnet.






37. Business transaction that occurs over Internet business - consumer consumer- consumer business - business






38. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters






39. Used to track and identify the location of high risk or high value items.






40. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips






41. A type of system software that allows users to perform maintenence type tasks






42. Saves any open documents and programs to RAM and places computer into a low power state






43. Retains existing application software and data files even if you can change computer models or vendors






44. Graphics processing unit controls the manipulation and display of graphics on the display device.






45. A computer that delivers requested web pages to your computer






46. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO






47. A special purpose computer that functions as a component in a larger product. Small with limited hardware






48. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk






49. Msot retail stores use POS to record purchases - process cards - and update inventory






50. A notcie that guarantees a user or web site is legit. E- commerce use it often